Action not permitted
Modal body text goes here.
CVE-2021-33197
Vulnerability from cvelistv5
Published
2021-08-02 18:54
Modified
2024-08-03 23:42
Severity
Summary
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
References
Source | URL | Tags |
---|---|---|
cve@mitre.org | https://groups.google.com/g/golang-announce | Third Party Advisory |
cve@mitre.org | https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI | Exploit, Patch, Third Party Advisory |
cve@mitre.org | https://security.gentoo.org/glsa/202208-02 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:20.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/g/golang-announce" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-04T15:08:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/g/golang-announce" }, { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202208-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33197", "datePublished": "2021-08-02T18:54:45", "dateReserved": "2021-05-19T00:00:00", "dateUpdated": "2024-08-03T23:42:20.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-33197\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-08-02T19:15:08.493\",\"lastModified\":\"2022-09-14T21:11:23.020\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.\"},{\"lang\":\"es\",\"value\":\"En Go versiones anteriores a 1.15.13 y versiones 1.16.x anteriores a 1.16.5, algunas configuraciones de ReverseProxy (desde net/http/httputil) resultan en una situaci\u00f3n en la que un atacante es capaz de dejar caer cabeceras arbitrarias\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.15.13\",\"matchCriteriaId\":\"83DF0007-D86B-419A-8722-A8C8C3313684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.16.0\",\"versionEndExcluding\":\"1.16.5\",\"matchCriteriaId\":\"DBF475E5-A5BF-49FF-89A3-F7C7E0051E8F\"}]}]}],\"references\":[{\"url\":\"https://groups.google.com/g/golang-announce\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2021_3487
Vulnerability from csaf_redhat
Published
2021-09-15 13:41
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.2
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration
Security Fix(es):
* net/http: panic in ReadRequest and ReadResponse when reading a very large
header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.2\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: panic in ReadRequest and ReadResponse when reading a very large\nheader (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3487", "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3487.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update", "tracking": { "current_release_date": "2024-09-18T04:19:53+00:00", "generator": { "date": "2024-09-18T04:19:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3487", "initial_release_date": "2021-09-15T13:41:24+00:00", "revision_history": [ { "date": "2021-09-15T13:41:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-15T13:41:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.2", "product": { "name": "Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.2::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.src", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.src", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-3.1.el8ost.1?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-3.1.el8ost.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-3.1.el8ost.1?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-3.1.el8ost.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.src as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.src", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.2" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.2", "product_id": "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3487" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.2:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.2:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" } ] }
rhsa-2021_4156
Vulnerability from csaf_redhat
Published
2021-11-09 17:49
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The following packages have been upgraded to a later upstream version: golang (1.16.7). (BZ#1938071)
Security Fix(es):
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nThe following packages have been upgraded to a later upstream version: golang (1.16.7). (BZ#1938071)\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4156", "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1972825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972825" }, { "category": "external", "summary": "1976168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976168" }, { "category": "external", "summary": "1979100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979100" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4156.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:20:33+00:00", "generator": { "date": "2024-09-18T04:20:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4156", "initial_release_date": "2021-11-09T17:49:22+00:00", "revision_history": [ { "date": "2021-11-09T17:49:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T17:49:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8050020210817155413:8aa62369", "product": { "name": "go-toolset:rhel8:8050020210817155413:8aa62369", "product_id": "go-toolset:rhel8:8050020210817155413:8aa62369", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8050020210817155413:8aa62369" } } }, { "category": "product_version", "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product": { "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_id": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product_id": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product": { "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_id": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.6.0-1.module%2Bel8.5.0%2B10379%2Bd6b83bd0?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product": { "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_id": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.16.7-1.module%2Bel8.5.0%2B12246%2B1aac4e3f?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, "product_reference": "go-toolset:rhel8:8050020210817155413:8aa62369", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src" }, "product_reference": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64" }, "product_reference": "delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64 as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64" }, "product_reference": "golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch as a component of go-toolset:rhel8:8050020210817155413:8aa62369 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" }, "product_reference": "golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "relates_to_product_reference": "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debuginfo-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:delve-debugsource-0:1.6.0-1.module+el8.5.0+10379+d6b83bd0.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:go-toolset-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.src", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.aarch64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.ppc64le", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.s390x", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-bin-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-docs-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-misc-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-race-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.x86_64", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-src-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch", "AppStream-8.5.0.GA:go-toolset:rhel8:8050020210817155413:8aa62369:golang-tests-0:1.16.7-1.module+el8.5.0+12246+1aac4e3f.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhsa-2021_4104
Vulnerability from csaf_redhat
Published
2021-11-02 15:55
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.9.0 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.9.0 images:
RHEL-8-CNV-4.9
==============
kubevirt-v2v-conversion-container-v4.9.0-9
vm-import-controller-container-v4.9.0-15
cnv-containernetworking-plugins-container-v4.9.0-15
kubemacpool-container-v4.9.0-18
virtio-win-container-v4.9.0-8
vm-import-operator-container-v4.9.0-15
kubevirt-vmware-container-v4.9.0-8
kubevirt-template-validator-container-v4.9.0-14
cluster-network-addons-operator-container-v4.9.0-26
kubernetes-nmstate-handler-container-v4.9.0-25
node-maintenance-operator-container-v4.9.0-13
hostpath-provisioner-container-v4.9.0-6
bridge-marker-container-v4.9.0-13
kubevirt-ssp-operator-container-v4.9.0-28
ovs-cni-marker-container-v4.9.0-16
ovs-cni-plugin-container-v4.9.0-16
vm-import-virtv2v-container-v4.9.0-15
virt-cdi-apiserver-container-v4.9.0-35
virt-cdi-cloner-container-v4.9.0-35
virt-cdi-uploadproxy-container-v4.9.0-35
virt-cdi-controller-container-v4.9.0-35
hostpath-provisioner-operator-container-v4.9.0-15
virt-cdi-importer-container-v4.9.0-35
virt-cdi-uploadserver-container-v4.9.0-35
virt-cdi-operator-container-v4.9.0-35
virt-launcher-container-v4.9.0-58
virt-api-container-v4.9.0-58
virt-handler-container-v4.9.0-58
virt-operator-container-v4.9.0-58
virt-controller-container-v4.9.0-58
virt-artifacts-server-container-v4.9.0-58
libguestfs-tools-container-v4.9.0-58
cnv-must-gather-container-v4.9.0-54
hyperconverged-cluster-operator-container-v4.9.0-57
hyperconverged-cluster-webhook-container-v4.9.0-57
hco-bundle-registry-container-v4.9.0-249
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.9.0 images:\n\nRHEL-8-CNV-4.9\n==============\nkubevirt-v2v-conversion-container-v4.9.0-9\nvm-import-controller-container-v4.9.0-15\ncnv-containernetworking-plugins-container-v4.9.0-15\nkubemacpool-container-v4.9.0-18\nvirtio-win-container-v4.9.0-8\nvm-import-operator-container-v4.9.0-15\nkubevirt-vmware-container-v4.9.0-8\nkubevirt-template-validator-container-v4.9.0-14\ncluster-network-addons-operator-container-v4.9.0-26\nkubernetes-nmstate-handler-container-v4.9.0-25\nnode-maintenance-operator-container-v4.9.0-13\nhostpath-provisioner-container-v4.9.0-6\nbridge-marker-container-v4.9.0-13\nkubevirt-ssp-operator-container-v4.9.0-28\novs-cni-marker-container-v4.9.0-16\novs-cni-plugin-container-v4.9.0-16\nvm-import-virtv2v-container-v4.9.0-15\nvirt-cdi-apiserver-container-v4.9.0-35\nvirt-cdi-cloner-container-v4.9.0-35\nvirt-cdi-uploadproxy-container-v4.9.0-35\nvirt-cdi-controller-container-v4.9.0-35\nhostpath-provisioner-operator-container-v4.9.0-15\nvirt-cdi-importer-container-v4.9.0-35\nvirt-cdi-uploadserver-container-v4.9.0-35\nvirt-cdi-operator-container-v4.9.0-35\nvirt-launcher-container-v4.9.0-58\nvirt-api-container-v4.9.0-58\nvirt-handler-container-v4.9.0-58\nvirt-operator-container-v4.9.0-58\nvirt-controller-container-v4.9.0-58\nvirt-artifacts-server-container-v4.9.0-58\nlibguestfs-tools-container-v4.9.0-58\ncnv-must-gather-container-v4.9.0-54\nhyperconverged-cluster-operator-container-v4.9.0-57\nhyperconverged-cluster-webhook-container-v4.9.0-57\nhco-bundle-registry-container-v4.9.0-249\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4104", "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1858777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858777" }, { "category": "external", "summary": "1891921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891921" }, { "category": "external", "summary": "1896469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896469" }, { "category": "external", "summary": "1903687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903687" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1933043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933043" }, { "category": "external", "summary": "1935219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935219" }, { "category": "external", "summary": "1942726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942726" }, { "category": "external", "summary": "1943164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943164" }, { "category": "external", "summary": "1945589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945589" }, { "category": "external", "summary": "1953481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953481" }, { "category": "external", "summary": "1953483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953483" }, { "category": "external", "summary": "1953484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953484" }, { "category": "external", "summary": "1955129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955129" }, { "category": "external", "summary": "1957852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957852" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1963963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963963" }, { "category": "external", "summary": "1965050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965050" }, { "category": "external", "summary": "1973852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973852" }, { "category": "external", "summary": "1976604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976604" }, { "category": "external", "summary": "1976730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976730" }, { "category": "external", "summary": "1979631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979631" }, { "category": "external", "summary": "1979659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979659" }, { "category": "external", "summary": "1981345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981345" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1985083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985083" }, { "category": "external", "summary": "1985649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985649" }, { "category": "external", "summary": "1985670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985670" }, { "category": "external", "summary": "1985719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985719" }, { "category": "external", "summary": "1989176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989176" }, { "category": "external", "summary": "1989263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989263" }, { "category": "external", "summary": "1989269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989269" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1991691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991691" }, { "category": "external", "summary": "1992608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992608" }, { "category": "external", "summary": "1993121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993121" }, { "category": "external", "summary": "1994389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994389" }, { "category": "external", "summary": "1995295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995295" }, { "category": "external", "summary": "1996407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996407" }, { "category": "external", "summary": "1997014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997014" }, { "category": "external", "summary": "1998054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998054" }, { "category": "external", "summary": "1998656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998656" }, { "category": "external", "summary": "1999571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999571" }, { "category": "external", "summary": "1999617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999617" }, { "category": "external", "summary": "1999835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999835" }, { "category": "external", "summary": "2000052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000052" }, { "category": "external", "summary": "2000204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000204" }, { "category": "external", "summary": "2001041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001041" }, { "category": "external", "summary": "2001047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001047" }, { "category": "external", "summary": "2003473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003473" }, { "category": "external", "summary": "2005695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005695" }, { "category": "external", "summary": "2006418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006418" }, { "category": "external", "summary": "2008900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008900" }, { "category": "external", "summary": "2010742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010742" }, { "category": "external", "summary": "2011179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011179" }, { "category": "external", "summary": "2017394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017394" }, { "category": "external", "summary": "2018521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018521" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4104.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.0 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:20:06+00:00", "generator": { "date": "2024-09-18T04:20:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4104", "initial_release_date": "2021-11-02T15:55:53+00:00", "revision_history": [ { "date": "2021-11-02T15:55:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-02T15:55:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.9 for RHEL 8", "product": { "name": "CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.9.0-13" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.9.0-27" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.9.0-15" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.9.0-60" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.9.0-266" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.9.0-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.9.0-15" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.9.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.9.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.9.0-19" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.9.0-25" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.9.0-28" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.9.0-14" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.9.0-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.9.0-8" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel8\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.9.0-13" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.9.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.9.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "product_id": "container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel8\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.9.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.9.0-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.9.0-61" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.9.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.9.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.9.0-16" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:3ca4ad49caa78f772298b84bca2bc0bbc9e440ab248de857b4f7b37139cfe69e_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:8726e5e35ee4b31c66104e7c8e406d7b5040342954e0338ed548b5b2b1db583b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:ee27c1fee061e3c012e223821510d81bdbedc2f4dcce6b6a1df3ee4e7ee8d95b_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:ae296e5e29cb28b018708c511413c9b442e00adeeab117f55ef11aa697815cc5_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:2d7b4f8c04d4562029587c4b8e45d4b911ea4e3590c58bf2ecb2b7b238fd0778_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:62829517f9d288727e92023b07f734745d4cb033580b7047556d89297e7ff4e9_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:fb78148f30401dc81acd1ad71b8c158b6da1ab9a4cd5a3988cc6dfd84f89d0fd_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:a2140a25b75110f2353f88bcdcc6cbddeea41efd2b653242b8a3426f82cf060f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:4ab8d14a75e26afb8b63ed7253b93beafcd344be7729ed285c913e915dc43c2f_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:d3fd0c8f6c71af32e513d28f198bdfcbf60b717ff8c33683ce8441e46b18597e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:8d33c8d2d5fd949a860385fac4badc32f579bafd8fffa37554475340dbf5d2f5_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:7588b962baa2a7905775ecbf455f9a7c7ae77bcdeb8c59fd592019190f032fba_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:1f379e14ac3485ca5d7f1dbb2dbb626a642fe8b5ae699ba005d0b9a4ec7b3695_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools-rhel8@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:14d2899027eeb27b2d6f6f0f3c3a67fb1bc14e15ca5371f51c936103e679b148_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:67708c4cf950afbfc43720d3ce09a15365e43a102c6174fb97401921d80b00ae_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:c98838f838720bca7054c7b5e3622718d44c27799f5266eaf792865091f885a3_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:c3398a7e793e928e085b2f1ac718f875d38b0be36a6eb9a4f8365b116f6d3606_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:b2a9fd906d366609674d7731f256c7bb40dfce62cbaf1a1c4271b3c65b11d750_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server-rhel8@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:94394307fa2ebcb25f53a6b4866a98d182850b3f14173e4f6c795e9028939345_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:648caeddba7e2ce0cc1688c2d8dee297931d1fe980701227ca6852750f7b74dc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:c74085b7378db3caeeb89e9d895cc84a7d5eaf6d95e9d79f3556574c96444fda_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:c26dd3e565e9cad198f9ac6fb64e0ce03a1cb0d285971b75289d5055265546e6_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:784677fe9a730b807874b4f0cd6af672fd0ee0fa0af6172e1e1b435976abf96e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:86776c0fb82c7d2e3c2bfb9f0db0768eca7d54c9875d30e2137e07e744b15b5a_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:4fc9209b2235bdd882b71a473e8b2c2491f9dfd2597c5fc4c2279ed843f23b05_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:ae293aa279c552d60530dd75a9ad3eee349e404766d799cd07050dd34ab41a6d_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:5586c7c38b84a8195aa3cc59706d069c36a91a51ab8b53b0b0b6c13e5b19629a_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:8ecc2e45d4a5f09c65ea0e343ddb0f30bb791e55de3b989b7850fb402c3c6b9f_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:9a47e7f71bfd82a6bae03581c93c0b24bc56e60edf1f67956b48376467a82d3a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:21140d9f28a488d18d789be2ed8c2cd8e475e30aa337bfebdcb3b6901557d1ac_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:3aea2b6db027a2419f26bdb1b74b1d3ca09e6675180a46cefac45dd96516c6c5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:aedd7f690a2fd5ad2f2988c673f337fa96f235ebf40e20c55a77b29c73651df7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:a7510b66fe8331591ba7d612eea04995f5ef42c10a0380f957b5e4b8be17fe8e_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:1549e1e6f3f145cced51e7b7b0800103c2bf218300d4029ea3b11380e1249b1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:f94eabaa002e1c2ae6ec927744da1bfa77a87403bbbedf6bb079746e6b4d1ebc_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:1f821c2e1b1c04446792f5900e57b83c9a7adac6a0123486ebaecda33f4ab98d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_8008
Vulnerability from csaf_redhat
Published
2022-11-15 15:06
Modified
2024-09-18 14:41
Summary
Red Hat Security Advisory: buildah security and bug fix update
Notes
Topic
An update for buildah is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* containers/storage: DoS via malicious image (CVE-2021-20291)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* podman: possible information disclosure and modification (CVE-2022-2989)
* buildah: possible information disclosure and modification (CVE-2022-2990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for buildah is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. \n\nSecurity Fix(es):\n\n* containers/storage: DoS via malicious image (CVE-2021-20291)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* podman: possible information disclosure and modification (CVE-2022-2989)\n\n* buildah: possible information disclosure and modification (CVE-2022-2990)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8008", "url": "https://access.redhat.com/errata/RHSA-2022:8008" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index" }, { "category": "external", "summary": "1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2081835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081835" }, { "category": "external", "summary": "2121445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121445" }, { "category": "external", "summary": "2121453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121453" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_8008.json" } ], "title": "Red Hat Security Advisory: buildah security and bug fix update", "tracking": { "current_release_date": "2024-09-18T14:41:58+00:00", "generator": { "date": "2024-09-18T14:41:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:8008", "initial_release_date": "2022-11-15T15:06:08+00:00", "revision_history": [ { "date": "2022-11-15T15:06:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-15T15:06:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:41:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.27.0-2.el9.src", "product": { "name": "buildah-1:1.27.0-2.el9.src", "product_id": "buildah-1:1.27.0-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.el9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.27.0-2.el9.aarch64", "product": { "name": "buildah-1:1.27.0-2.el9.aarch64", "product_id": "buildah-1:1.27.0-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.el9.aarch64", "product": { "name": "buildah-tests-1:1.27.0-2.el9.aarch64", "product_id": "buildah-tests-1:1.27.0-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.el9.aarch64", "product": { "name": "buildah-debugsource-1:1.27.0-2.el9.aarch64", "product_id": "buildah-debugsource-1:1.27.0-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.el9.aarch64", "product": { "name": "buildah-debuginfo-1:1.27.0-2.el9.aarch64", "product_id": "buildah-debuginfo-1:1.27.0-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.el9?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.27.0-2.el9.ppc64le", "product": { "name": "buildah-1:1.27.0-2.el9.ppc64le", "product_id": "buildah-1:1.27.0-2.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.el9.ppc64le", "product": { "name": "buildah-tests-1:1.27.0-2.el9.ppc64le", "product_id": "buildah-tests-1:1.27.0-2.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.el9.ppc64le", "product": { "name": "buildah-debugsource-1:1.27.0-2.el9.ppc64le", "product_id": "buildah-debugsource-1:1.27.0-2.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "product": { "name": "buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "product_id": "buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.el9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.27.0-2.el9.x86_64", "product": { "name": "buildah-1:1.27.0-2.el9.x86_64", "product_id": "buildah-1:1.27.0-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.el9.x86_64", "product": { "name": "buildah-tests-1:1.27.0-2.el9.x86_64", "product_id": "buildah-tests-1:1.27.0-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.el9.x86_64", "product": { "name": "buildah-debugsource-1:1.27.0-2.el9.x86_64", "product_id": "buildah-debugsource-1:1.27.0-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.el9.x86_64", "product": { "name": "buildah-debuginfo-1:1.27.0-2.el9.x86_64", "product_id": "buildah-debuginfo-1:1.27.0-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.el9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.27.0-2.el9.s390x", "product": { "name": "buildah-1:1.27.0-2.el9.s390x", "product_id": "buildah-1:1.27.0-2.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.27.0-2.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.27.0-2.el9.s390x", "product": { "name": "buildah-tests-1:1.27.0-2.el9.s390x", "product_id": "buildah-tests-1:1.27.0-2.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.27.0-2.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.27.0-2.el9.s390x", "product": { "name": "buildah-debugsource-1:1.27.0-2.el9.s390x", "product_id": "buildah-debugsource-1:1.27.0-2.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.27.0-2.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.27.0-2.el9.s390x", "product": { "name": "buildah-debuginfo-1:1.27.0-2.el9.s390x", "product_id": "buildah-debuginfo-1:1.27.0-2.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.27.0-2.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "product_id": "buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.27.0-2.el9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64" }, "product_reference": "buildah-1:1.27.0-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le" }, "product_reference": "buildah-1:1.27.0-2.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x" }, "product_reference": "buildah-1:1.27.0-2.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src" }, "product_reference": "buildah-1:1.27.0-2.el9.src", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.27.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64" }, "product_reference": "buildah-1:1.27.0-2.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.27.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64" }, "product_reference": "buildah-debuginfo-1:1.27.0-2.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64" }, "product_reference": "buildah-debugsource-1:1.27.0-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le" }, "product_reference": "buildah-debugsource-1:1.27.0-2.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x" }, "product_reference": "buildah-debugsource-1:1.27.0-2.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.27.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64" }, "product_reference": "buildah-debugsource-1:1.27.0-2.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64" }, "product_reference": "buildah-tests-1:1.27.0-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le" }, "product_reference": "buildah-tests-1:1.27.0-2.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x" }, "product_reference": "buildah-tests-1:1.27.0-2.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.27.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64" }, "product_reference": "buildah-tests-1:1.27.0-2.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aviv Sasson" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-20291", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2021-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1939485" } ], "notes": [ { "category": "description", "text": "A deadlock vulnerability was found in `github.com/containers/storage`. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/storage: DoS via malicious image", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability was first exposed in v1.23.8 of containers/storage (and subsequently fixed in v1.28.1) with this git commit [1].\n\n* In OpenShift Container Platform (OCP) only 4.7 contains a version of CRI-O (and openshift/ose-docker-builder) which uses a vulnerable version of containers/storage. Subsequently this has been addressed in OCP 4.7.7.\n\n* Red Hat Quay quay-builder-container is not affected because it uses a version of github.com/containers/storage earlier than v1.23.8\n\n* Red Hat Openshift Virtualization is not affected because all containers depending on github.com/containers/storage use a version earlier than v1.23.8\n\n* For Red Hat OpenStack Platform, because containers/storage is not directly used by the director-operator, no update will be provided at this time for the operator containers.\n\n[1] - https://github.com/containers/storage/blob/e9989a949a0d2c32fa82d3ff1076e33cfec58cb9/layers.go#L1332", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20291" }, { "category": "external", "summary": "RHBZ#1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20291", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291" }, { "category": "external", "summary": "https://unit42.paloaltonetworks.com/cve-2021-20291/", "url": "https://unit42.paloaltonetworks.com/cve-2021-20291/" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/storage: DoS via malicious image" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "acknowledgments": [ { "names": [ "Steven Murdoch" ] } ], "cve": "CVE-2022-2989", "cwe": { "id": "CWE-842", "name": "Placement of User into Incorrect Group" }, "discovery_date": "2022-08-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121445" } ], "notes": [ { "category": "description", "text": "An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: possible information disclosure and modification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2989" }, { "category": "external", "summary": "RHBZ#2121445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2989", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2989" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2989", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2989" }, { "category": "external", "summary": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/", "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/" } ], "release_date": "2022-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "podman: possible information disclosure and modification" }, { "acknowledgments": [ { "names": [ "Steven Murdoch" ] } ], "cve": "CVE-2022-2990", "cwe": { "id": "CWE-842", "name": "Placement of User into Incorrect Group" }, "discovery_date": "2022-08-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121453" } ], "notes": [ { "category": "description", "text": "An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.", "title": "Vulnerability description" }, { "category": "summary", "text": "buildah: possible information disclosure and modification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2990" }, { "category": "external", "summary": "RHBZ#2121453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2990", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2990" }, { "category": "external", "summary": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/", "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/" } ], "release_date": "2022-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "buildah: possible information disclosure and modification" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8008" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.src", "AppStream-9.1.0.GA:buildah-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debuginfo-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-debugsource-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-1:1.27.0-2.el9.x86_64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.aarch64", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.ppc64le", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.s390x", "AppStream-9.1.0.GA:buildah-tests-debuginfo-1:1.27.0-2.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" } ] }
rhsa-2021_5086
Vulnerability from csaf_redhat
Published
2021-12-13 19:26
Modified
2024-09-18 04:21
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Container Platform. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multicloud data management service with an S3
compatible API.
Security Fix(es):
* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 (CVE-2020-8565)
* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)
* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)
* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information refer to the CVE
page(s) listed in the References section.
These updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to
these updated images, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite (CVE-2021-32803)\n\n* nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite (CVE-2021-32804)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37701)\n\n* nodejs-tar: insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite (CVE-2021-37712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information refer to the CVE\npage(s) listed in the References section.\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to\nthese updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5086", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1810525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1810525" }, { "category": "external", "summary": "1853638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853638" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1890438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890438" }, { "category": "external", "summary": "1890978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890978" }, { "category": "external", "summary": "1892709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892709" }, { "category": "external", "summary": "1901954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901954" }, { "category": "external", "summary": "1910790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910790" }, { "category": "external", "summary": "1927782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927782" }, { "category": "external", "summary": "1929242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929242" }, { "category": "external", "summary": "1932396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932396" }, { "category": "external", "summary": "1934625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934625" }, { "category": "external", "summary": "1956285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956285" }, { "category": "external", "summary": "1959793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959793" }, { "category": "external", "summary": "1964083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964083" }, { "category": "external", "summary": "1965322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965322" }, { "category": "external", "summary": "1968510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968510" }, { "category": "external", "summary": "1968606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968606" }, { "category": "external", "summary": "1969216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969216" }, { "category": "external", "summary": "1973256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973256" }, { "category": "external", "summary": "1975272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975272" }, { "category": "external", "summary": "1975581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975581" }, { "category": "external", "summary": "1979244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979244" }, { "category": "external", "summary": "1979502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979502" }, { "category": "external", "summary": "1980818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980818" }, { "category": "external", "summary": "1981331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981331" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983756" }, { "category": "external", "summary": "1984284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984284" }, { "category": "external", "summary": "1984334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984334" }, { "category": "external", "summary": "1984396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984396" }, { "category": "external", "summary": "1984735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984735" }, { "category": "external", "summary": "1985074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985074" }, { "category": "external", "summary": "1986444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986444" }, { "category": "external", "summary": "1986794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986794" }, { "category": "external", "summary": "1987806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987806" }, { "category": "external", "summary": "1988518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988518" }, { "category": "external", "summary": "1989482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989482" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990230" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1991822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991822" }, { "category": "external", "summary": "1992472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992472" }, { "category": "external", "summary": "1994261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994261" }, { "category": "external", "summary": "1994577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994577" }, { "category": "external", "summary": "1994584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994584" }, { "category": "external", "summary": "1994602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994602" }, { "category": "external", "summary": "1994606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994606" }, { "category": "external", "summary": "1994687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994687" }, { "category": "external", "summary": "1995009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995009" }, { "category": "external", "summary": "1995056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995056" }, { "category": "external", "summary": "1995271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995271" }, { "category": "external", "summary": "1995718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995718" }, { "category": "external", "summary": "1997237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997237" }, { "category": "external", "summary": "1997624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997624" }, { "category": "external", "summary": "1997738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997738" }, { "category": "external", "summary": "1997922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997922" }, { "category": "external", "summary": "1998851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998851" }, { "category": "external", "summary": "1999050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999050" }, { "category": "external", "summary": "1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "1999748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999748" }, { "category": "external", "summary": "1999763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999763" }, { "category": "external", "summary": "1999767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999767" }, { "category": "external", "summary": "2000082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000082" }, { "category": "external", "summary": "2000098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000098" }, { "category": "external", "summary": "2000143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000143" }, { "category": "external", "summary": "2000190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000190" }, { "category": "external", "summary": "2000579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000579" }, { "category": "external", "summary": "2000588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000588" }, { "category": "external", "summary": "2000860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000860" }, { "category": "external", "summary": "2000865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000865" }, { "category": "external", "summary": "2001482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001482" }, { "category": "external", "summary": "2001539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001539" }, { "category": "external", "summary": "2001580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001580" }, { "category": "external", "summary": "2001970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001970" }, { "category": "external", "summary": "2002225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002225" }, { "category": "external", "summary": "2003444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003444" }, { "category": "external", "summary": "2003904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003904" }, { "category": "external", "summary": "2004003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004003" }, { "category": "external", "summary": "2004013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004013" }, { "category": "external", "summary": "2004030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004030" }, { "category": "external", "summary": "2004824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004824" }, { "category": "external", "summary": "2005103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005103" }, { "category": "external", "summary": "2005290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005290" }, { "category": "external", "summary": "2005812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005812" }, { "category": "external", "summary": "2005838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005838" }, { "category": "external", "summary": "2005843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005843" }, { "category": "external", "summary": "2005937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005937" }, { "category": "external", "summary": "2006176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006176" }, { "category": "external", "summary": "2006865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006865" }, { "category": "external", "summary": "2007130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007130" }, { "category": "external", "summary": "2007202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007202" }, { "category": "external", "summary": "2007212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007212" }, { "category": "external", "summary": "2007377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007377" }, { "category": "external", "summary": "2007717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007717" }, { "category": "external", "summary": "2010041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010041" }, { "category": "external", "summary": "2010185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010185" }, { "category": "external", "summary": "2010188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010188" }, { "category": "external", "summary": "2010194", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010194" }, { "category": "external", "summary": "2010202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010202" }, { "category": "external", "summary": "2011225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011225" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_5086.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:21:28+00:00", "generator": { "date": "2024-09-18T04:21:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:5086", "initial_release_date": "2021-12-13T19:26:22+00:00", "revision_history": [ { "date": "2021-12-13T19:26:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T19:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:21:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_id": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb?arch=s390x\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_id": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039?arch=ppc64le\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=4.9-164.57484e3.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=4.9-257.4181add.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_id": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=4.9-39.0f2fa23.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_id": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d?arch=amd64\u0026repository_url=registry.redhat.io/odf/odf-multicluster-rhel8-operator\u0026tag=4.9-30.007b3d8.release_4.9" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_id": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=4.9-59.c8bbc1f.release_4.9" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=4.9.0-5" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=4.9-27.3d037cc.release_4.9" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=4.9-219.c3f67c6.release_4.9" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=4.9-28.82f68db.release_4.9" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999731" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain both a directory and a symlink with the same name, where the symlink and directory names in the archive entry used backslashes as a path separator, made it possible to bypass node-tar symlink checks on directories. This flaw allows an untrusted tar file to extract and overwrite files into an arbitrary location. A similar confusion can arise on case-insensitive filesystems. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37701" }, { "category": "external", "summary": "RHBZ#1999731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999731" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37701", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1779", "url": "https://www.npmjs.com/advisories/1779" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999739" } ], "notes": [ { "category": "description", "text": "A flaw was found in the npm package \"tar\" (aka node-tar). Extracting tar files that contain two directories and a symlink with names containing Unicode values that normalize to the same value on Windows systems made it possible to bypass node-tar symlink checks on directories. This allows an untrusted tar file to extract and overwrite files into an arbitrary location. The highest threat from this vulnerability is to integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux version 8 and Red Hat Software Collection both embed `node-tar` in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37712" }, { "category": "external", "summary": "RHBZ#1999739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p" }, { "category": "external", "summary": "https://www.npmjs.com/advisories/1780", "url": "https://www.npmjs.com/advisories/1780" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5086" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:6bb536ff91903016dcce91fcf6df30286321b7a415bcca68d22ca0a283406745_s390x", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:7c3beaacde875028141485219de5c780c3c30b146bcc533dfe1eb6c562a65b95_amd64", "8Base-RH-ODF-4.9:odf4/cephcsi-rhel8@sha256:f3b19e5732308b4d40f1b605169ac3f15a03194cb4dd47819ef073f36a0d1849_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:38d08ac83d988cda406d8cc6c2209ece706e125da07e202996f606c22c914349_s390x", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b0211a2fdad8d5e6fdefeece952aa9c51598b74d74a12d5adec4bed4e2783b2d_amd64", "8Base-RH-ODF-4.9:odf4/ocs-must-gather-rhel8@sha256:b1b008efb550c5fce0797378d96bb191a0c28aa15e813d759786e663fabb0274_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:19baeee4a9db7519f1b88a885034be1e35423f34854323ac4a1b0e88e881bc3f_amd64", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:7507787d2c8f920c718c15b93e9c24f7edf8047a24c7c0c2024d70915d7ff1d2_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-operator-bundle@sha256:af844ee09da74a2bf95779de502b683982cfb54227f196f24ef07221af5ec9d8_s390x", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:1fe31ad232d5ffc1eb202db0f83eb882eeca1bde83ba282fe412485c5b2bc479_amd64", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:355c50572c534973734eaeb171375bae9e0342504942b28585f5498829ae8aeb_ppc64le", "8Base-RH-ODF-4.9:odf4/ocs-rhel8-operator@sha256:b02b6d2cd44672787e0fa5569074c4a8cdcc6fde0206fe01ef6d9d70a6385d0c_s390x", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:02777f2cd36c40d5c09a28116e24c1c7a8ee0c6030d680281e042d08e1fd61f6_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:71724ee7baa629a98b4bf979e232dd128a313a2fa1eb4156c5b69593c99ec181_amd64", "8Base-RH-ODF-4.9:odf4/odf-console-rhel8@sha256:fd1659e10e099871d6a956bb26c3c17ed9a9bccc5ed90768514be8b0dcc34ff3_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:5a3e1458b856d295ba8fa9d075845d2524c6130d60db07b85cce99f5719a014f_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:b66338b35316b95d01fc30a207fd80227c2cb0cbc06ee516230dbb4e2c2e369e_s390x", "8Base-RH-ODF-4.9:odf4/odf-multicluster-operator-bundle@sha256:ee9641382dcfccd9db92c66bab549c0b44a218572e40011c2e22b651d4ff64af_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:17be1d705d7339f6e5f10d77c065c7a876c248c0913f625754443e58279c5039_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:446de9c6969efa219fd09aca97e8f1d34a18aa5a1553cad93ea03d1c99d75e9d_amd64", "8Base-RH-ODF-4.9:odf4/odf-multicluster-rhel8-operator@sha256:80c5ca69a4a153fe862d2edc12910131b9edaf3dd4ad544c2a30d1e363bf4bdb_s390x", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:2231fc5ebf70c6165947bdc31f95b6deaa69f1efbd6c6194b457e2ad7bb10948_amd64", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:5d47bf5c8aaadc387d2bde705cfc3238436bd29547139e6ce82bb3c9512da7f4_ppc64le", "8Base-RH-ODF-4.9:odf4/odf-operator-bundle@sha256:f51b12d4d34949b0932386e26af1c33db240d95a3e20b0ccdb469e4596124220_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:43679e013dacc86f5d181455fd533bc32a1d1b48e8cd2b0a88905c941127c09e_s390x", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:bbfcc2e62edb26b19578242800bf654cd74efbb33ff81273d62e207deff15c13_amd64", "8Base-RH-ODF-4.9:odf4/odf-rhel8-operator@sha256:ec0bd017c0ee777a3347c5fa83417fbb9f7d9e69fed7d6091b2e9a87dbaa9bff_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:5154833553993db3075424d9d0799548b0031123811832004d876c307becd6c7_s390x", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:95f7e6d4b0bfbbebd6f88b6a38e44e617d43bb2c10d473faa581fc235bdb7048_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-cluster-operator-bundle@sha256:f936b221644cebeea79a937c03261911fd2cc2181adcfc9381b2bd3890bb00d5_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:088270d599e6b65a321c2267057c655acad9e7df8baf2066c6da128d85479a16_amd64", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:0cfd5566150cd039abf04aaaa52cb95e86bc2e1044c64a58c4a5cd372f415c94_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-hub-operator-bundle@sha256:972d770ad4d54dd8663a715b81112c84ebf29ef4724190ffb440608c5fb665db_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:49df4d5554221b8aea998b9e06a24c01735d17c488aee4cbaf084bc0fedc5fcb_ppc64le", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:d9485425d2ce02a7279f7fb8e857f070f0fec7753f1219824e5988a5f14023e1_s390x", "8Base-RH-ODF-4.9:odf4/odr-rhel8-operator@sha256:ed5f3964c9c2e4e9e1da1b5759f7abbdc8f7139ee3d3c7984aca2491bde23b2d_amd64", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:0108cf6fabd19895a2be1b0a7cf0a33892a720d2b480b97e689100973f3d08ab_ppc64le", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:063bf4439fe8f803a21bc3c30e7afc8d9cfa7959a4635223ad176a1d9d1083b3_s390x", "8Base-RH-ODF-4.9:odf4/rook-ceph-rhel8-operator@sha256:edcab10440eebf3ea2732e1d345de9da8e598d3871e4ebf13d8b9cde7186f0b4_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:4fdaa73a9dc52c03407b845759f5bfa42289cbfcc62f23a000e1200399ff1336_amd64", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:536340adaaa6ff74a0305cc350b85d92fdfc36c30012d7875c7527c672b14ebe_s390x", "8Base-RH-ODF-4.9:odf4/volume-replication-rhel8-operator@sha256:62e9c97030fc7ab33e36f2d76f9a566f015498c80ab0b8a6e9b5b02ab6895927_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links allowing arbitrary file creation and overwrite" } ] }
rhsa-2022_1329
Vulnerability from csaf_redhat
Published
2022-04-12 15:09
Modified
2024-09-18 04:21
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update
Notes
Topic
Red Hat OpenShift Virtualization release 4.8.5 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 4.8.5 RPMs.
Security Fix(es):
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.8.5 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 4.8.5 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1329", "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "2044050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044050" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1329.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update", "tracking": { "current_release_date": "2024-09-18T04:21:55+00:00", "generator": { "date": "2024-09-18T04:21:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1329", "initial_release_date": "2022-04-12T15:09:58+00:00", "revision_history": [ { "date": "2022-04-12T15:09:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-12T15:09:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:21:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.8 for RHEL 8", "product": { "name": "CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8" } } }, { "category": "product_name", "name": "CNV 4.8 for RHEL 7", "product": { "name": "CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el7" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:4.8.5-278.el8.src", "product": { "name": "kubevirt-0:4.8.5-278.el8.src", "product_id": "kubevirt-0:4.8.5-278.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.8.5-278.el8?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:4.8.5-278.el7.src", "product": { "name": "kubevirt-0:4.8.5-278.el7.src", "product_id": "kubevirt-0:4.8.5-278.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.8.5-278.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "product_id": "kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.5-278.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.5-278.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "product_id": "kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.8.5-278.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.8.5-278.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.8.5-278.el7.src as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src" }, "product_reference": "kubevirt-0:4.8.5-278.el7.src", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.8.5-278.el7.x86_64 as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64 as a component of CNV 4.8 for RHEL 7", "product_id": "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.8.5-278.el8.src as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src" }, "product_reference": "kubevirt-0:4.8.5-278.el8.src", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.8.5-278.el8.x86_64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1329" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.8:kubevirt-0:4.8.5-278.el7.src", "7Server-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el7.x86_64", "7Server-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el7.x86_64", "8Base-CNV-4.8:kubevirt-0:4.8.5-278.el8.src", "8Base-CNV-4.8:kubevirt-virtctl-0:4.8.5-278.el8.x86_64", "8Base-CNV-4.8:kubevirt-virtctl-redistributable-0:4.8.5-278.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3431
Vulnerability from csaf_redhat
Published
2021-09-07 08:38
Modified
2024-09-18 14:39
Summary
Red Hat Security Advisory: go-toolset-1.15-golang security update
Notes
Topic
An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.15-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3431", "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3431.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.15-golang security update", "tracking": { "current_release_date": "2024-09-18T14:39:32+00:00", "generator": { "date": "2024-09-18T14:39:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3431", "initial_release_date": "2021-09-07T08:38:58+00:00", "revision_history": [ { "date": "2021-09-07T08:38:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-07T08:38:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:39:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2021" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-race@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-bin@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-misc@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-src@1.15.14-2.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product_id": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-tests@1.15.14-2.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product_id": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.15-golang-docs@1.15.14-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch" }, "product_reference": "go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2021.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" }, "product_reference": "go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2021.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3431" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Server-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Server-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.src", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-bin-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-docs-0:1.15.14-2.el7_9.noarch", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-misc-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-race-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-src-0:1.15.14-2.el7_9.x86_64", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.ppc64le", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.s390x", "7Workstation-DevTools-2021.2:go-toolset-1.15-golang-tests-0:1.15.14-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" } ] }
rhsa-2021_4226
Vulnerability from csaf_redhat
Published
2021-11-09 18:42
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: grafana security, bug fix, and enhancement update
Notes
Topic
An update for grafana is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
The following packages have been upgraded to a later upstream version: grafana (7.5.9). (BZ#1921191)
Security Fix(es):
* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
* grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for grafana is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB \u0026 OpenTSDB. \n\nThe following packages have been upgraded to a later upstream version: grafana (7.5.9). (BZ#1921191)\n\nSecurity Fix(es):\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4226", "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "1921191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921191" }, { "category": "external", "summary": "1941024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941024" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_4226.json" } ], "title": "Red Hat Security Advisory: grafana security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:20:40+00:00", "generator": { "date": "2024-09-18T04:20:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:4226", "initial_release_date": "2021-11-09T18:42:22+00:00", "revision_history": [ { "date": "2021-11-09T18:42:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:42:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "grafana-0:7.5.9-4.el8.src", "product": { "name": "grafana-0:7.5.9-4.el8.src", "product_id": "grafana-0:7.5.9-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@7.5.9-4.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "grafana-0:7.5.9-4.el8.aarch64", "product": { "name": "grafana-0:7.5.9-4.el8.aarch64", "product_id": "grafana-0:7.5.9-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@7.5.9-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "grafana-debuginfo-0:7.5.9-4.el8.aarch64", "product": { "name": "grafana-debuginfo-0:7.5.9-4.el8.aarch64", "product_id": "grafana-debuginfo-0:7.5.9-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana-debuginfo@7.5.9-4.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "grafana-0:7.5.9-4.el8.ppc64le", "product": { "name": "grafana-0:7.5.9-4.el8.ppc64le", "product_id": "grafana-0:7.5.9-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@7.5.9-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "product": { "name": "grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "product_id": "grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana-debuginfo@7.5.9-4.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "grafana-0:7.5.9-4.el8.x86_64", "product": { "name": "grafana-0:7.5.9-4.el8.x86_64", "product_id": "grafana-0:7.5.9-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@7.5.9-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "grafana-debuginfo-0:7.5.9-4.el8.x86_64", "product": { "name": "grafana-debuginfo-0:7.5.9-4.el8.x86_64", "product_id": "grafana-debuginfo-0:7.5.9-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana-debuginfo@7.5.9-4.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "grafana-0:7.5.9-4.el8.s390x", "product": { "name": "grafana-0:7.5.9-4.el8.s390x", "product_id": "grafana-0:7.5.9-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana@7.5.9-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "grafana-debuginfo-0:7.5.9-4.el8.s390x", "product": { "name": "grafana-debuginfo-0:7.5.9-4.el8.s390x", "product_id": "grafana-debuginfo-0:7.5.9-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grafana-debuginfo@7.5.9-4.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "grafana-0:7.5.9-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64" }, "product_reference": "grafana-0:7.5.9-4.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-0:7.5.9-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le" }, "product_reference": "grafana-0:7.5.9-4.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-0:7.5.9-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x" }, "product_reference": "grafana-0:7.5.9-4.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-0:7.5.9-4.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src" }, "product_reference": "grafana-0:7.5.9-4.el8.src", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-0:7.5.9-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64" }, "product_reference": "grafana-0:7.5.9-4.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-debuginfo-0:7.5.9-4.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64" }, "product_reference": "grafana-debuginfo-0:7.5.9-4.el8.aarch64", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-debuginfo-0:7.5.9-4.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le" }, "product_reference": "grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-debuginfo-0:7.5.9-4.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x" }, "product_reference": "grafana-debuginfo-0:7.5.9-4.el8.s390x", "relates_to_product_reference": "AppStream-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "grafana-debuginfo-0:7.5.9-4.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" }, "product_reference": "grafana-debuginfo-0:7.5.9-4.el8.x86_64", "relates_to_product_reference": "AppStream-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3114", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918750" } ], "notes": [ { "category": "description", "text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: incorrect operations on the P-224 curve", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3114" }, { "category": "external", "summary": "RHBZ#1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "release_date": "2021-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4226" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: incorrect operations on the P-224 curve" }, { "cve": "CVE-2021-27358", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941024" } ], "notes": [ { "category": "description", "text": "A flaw was found in Grafana. The snapshot feature allows unauthenticated remote attackers to trigger a denial of service (DoS) via a remote API call if anonymous access is enabled. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call", "title": "Vulnerability summary" }, { "category": "other", "text": "While in OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) there is shipped a vulnerable version of grafana, access to the grafana panel is behind OpenShift OAuth proxy and requires admin permissions. Therefore these components are affected but with impact Low.\n\nRed Hat Ceph Storage (RHCS) and Red Hat Gluster Storage 3 does not ship the directly affected code, however, they are still affected by this vulnerability because it allows the same configuration of anonymous snapshots, hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27358" }, { "category": "external", "summary": "RHBZ#1941024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27358" }, { "category": "external", "summary": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/", "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-4-2/" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4226" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4226" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4226" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.src", "AppStream-8.5.0.GA:grafana-0:7.5.9-4.el8.x86_64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.aarch64", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.ppc64le", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.s390x", "AppStream-8.5.0.GA:grafana-debuginfo-0:7.5.9-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_1402
Vulnerability from csaf_redhat
Published
2022-04-19 13:35
Modified
2024-09-18 04:22
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.10 RPMs security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 2.6.10 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains OpenShift Virtualization 2.6.10 RPMs.
Security Fix(es):
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 2.6.10 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform. \n\nThis advisory contains OpenShift Virtualization 2.6.10 RPMs.\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1402", "url": "https://access.redhat.com/errata/RHSA-2022:1402" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "2051113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051113" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_1402.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.10 RPMs security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:22:27+00:00", "generator": { "date": "2024-09-18T04:22:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:1402", "initial_release_date": "2022-04-19T13:35:58+00:00", "revision_history": [ { "date": "2022-04-19T13:35:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-04-19T13:35:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:22:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 7", "product": { "name": "CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el7" } } }, { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:2.6.10-230.el7.src", "product": { "name": "kubevirt-0:2.6.10-230.el7.src", "product_id": "kubevirt-0:2.6.10-230.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@2.6.10-230.el7?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:2.6.10-230.el8.src", "product": { "name": "kubevirt-0:2.6.10-230.el8.src", "product_id": "kubevirt-0:2.6.10-230.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@2.6.10-230.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "product_id": "kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.10-230.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.10-230.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "product_id": "kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@2.6.10-230.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@2.6.10-230.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:2.6.10-230.el7.src as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src" }, "product_reference": "kubevirt-0:2.6.10-230.el7.src", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:2.6.10-230.el7.x86_64 as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64 as a component of CNV 2.6 for RHEL 7", "product_id": "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "relates_to_product_reference": "7Server-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:2.6.10-230.el8.src as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src" }, "product_reference": "kubevirt-0:2.6.10-230.el8.src", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:2.6.10-230.el8.x86_64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1402" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-2.6:kubevirt-0:2.6.10-230.el7.src", "7Server-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el7.x86_64", "7Server-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el7.x86_64", "8Base-CNV-2.6:kubevirt-0:2.6.10-230.el8.src", "8Base-CNV-2.6:kubevirt-virtctl-0:2.6.10-230.el8.x86_64", "8Base-CNV-2.6:kubevirt-virtctl-redistributable-0:2.6.10-230.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" } ] }
rhsa-2022_7954
Vulnerability from csaf_redhat
Published
2022-11-15 13:20
Modified
2024-09-18 14:41
Summary
Red Hat Security Advisory: podman security and bug fix update
Notes
Topic
An update for podman is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
* containers/storage: DoS via malicious image (CVE-2021-20291)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for podman is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.\n\nSecurity Fix(es):\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n\n* podman: podman machine spawns gvproxy with port bound to all IPs (CVE-2021-4024)\n\n* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)\n\n* containers/storage: DoS via malicious image (CVE-2021-20291)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7954", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "1972303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972303" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "2026675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675" }, { "category": "external", "summary": "2040379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040379" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2081349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081349" }, { "category": "external", "summary": "2088116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088116" }, { "category": "external", "summary": "2092798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092798" }, { "category": "external", "summary": "2097694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097694" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_7954.json" } ], "title": "Red Hat Security Advisory: podman security and bug fix update", "tracking": { "current_release_date": "2024-09-18T14:41:51+00:00", "generator": { "date": "2024-09-18T14:41:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:7954", "initial_release_date": "2022-11-15T13:20:30+00:00", "revision_history": [ { "date": "2022-11-15T13:20:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-15T13:20:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:41:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.src", "product": { "name": "podman-2:4.2.0-3.el9.src", "product_id": "podman-2:4.2.0-3.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-2:4.2.0-3.el9.aarch64", "product_id": "podman-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product_id": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-plugins-2:4.2.0-3.el9.aarch64", "product_id": "podman-plugins-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-remote-2:4.2.0-3.el9.aarch64", "product_id": "podman-remote-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-tests-2:4.2.0-3.el9.aarch64", "product_id": "podman-tests-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product_id": "podman-debugsource-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=aarch64\u0026epoch=2" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-2:4.2.0-3.el9.ppc64le", "product_id": "podman-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product_id": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product_id": "podman-plugins-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-remote-2:4.2.0-3.el9.ppc64le", "product_id": "podman-remote-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-tests-2:4.2.0-3.el9.ppc64le", "product_id": "podman-tests-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product_id": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-2:4.2.0-3.el9.x86_64", "product_id": "podman-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product_id": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-plugins-2:4.2.0-3.el9.x86_64", "product_id": "podman-plugins-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-remote-2:4.2.0-3.el9.x86_64", "product_id": "podman-remote-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-tests-2:4.2.0-3.el9.x86_64", "product_id": "podman-tests-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product_id": "podman-debugsource-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "podman-2:4.2.0-3.el9.s390x", "product": { "name": "podman-2:4.2.0-3.el9.s390x", "product_id": "podman-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product": { "name": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product_id": "podman-gvproxy-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-3.el9.s390x", "product": { "name": "podman-plugins-2:4.2.0-3.el9.s390x", "product_id": "podman-plugins-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-3.el9.s390x", "product": { "name": "podman-remote-2:4.2.0-3.el9.s390x", "product_id": "podman-remote-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-3.el9.s390x", "product": { "name": "podman-tests-2:4.2.0-3.el9.s390x", "product_id": "podman-tests-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-3.el9.s390x", "product": { "name": "podman-debugsource-2:4.2.0-3.el9.s390x", "product_id": "podman-debugsource-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product_id": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-3.el9?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-docker-2:4.2.0-3.el9.noarch", "product": { "name": "podman-docker-2:4.2.0-3.el9.noarch", "product_id": "podman-docker-2:4.2.0-3.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-3.el9?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src" }, "product_reference": "podman-2:4.2.0-3.el9.src", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-debugsource-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-2:4.2.0-3.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch" }, "product_reference": "podman-docker-2:4.2.0-3.el9.noarch", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-gvproxy-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-plugins-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-remote-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-remote-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-remote-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-remote-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64" }, "product_reference": "podman-tests-2:4.2.0-3.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le" }, "product_reference": "podman-tests-2:4.2.0-3.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x" }, "product_reference": "podman-tests-2:4.2.0-3.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-3.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" }, "product_reference": "podman-tests-2:4.2.0-3.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-4024", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-11-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2026675" } ], "notes": [ { "category": "description", "text": "A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host\u0027s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host\u0027s services by forwarding all ports to the VM.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: podman machine spawns gvproxy with port bound to all IPs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4024" }, { "category": "external", "summary": "RHBZ#2026675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4024", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4024" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4024" } ], "release_date": "2021-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: podman machine spawns gvproxy with port bound to all IPs" }, { "cve": "CVE-2021-20199", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919050" } ], "notes": [ { "category": "description", "text": "A flaw was found in podman. Rootless containers receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts) which impact containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Remote traffic to rootless containers is seen as orginating from localhost", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Podman prior to version 1.8.0. Podman shipped in the following products are therefore not affected:\n\n* Red Hat Enterprise Linux 7 Extras\n* Red Hat Enterprise Linux 8 Container Tools stream 1.0\n* Red Hat Enterprise Linux 8 Container Tools stream 2.0\n* OpenShift Container Platform 3.11\n* OpenShift Container Platform 4.1 to 4.5", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20199" }, { "category": "external", "summary": "RHBZ#1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199" } ], "release_date": "2021-01-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "workaround", "details": "Configure containerized applications to require authentication for connections from all sources, including localhost.", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Remote traffic to rootless containers is seen as orginating from localhost" }, { "acknowledgments": [ { "names": [ "Aviv Sasson" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-20291", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2021-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1939485" } ], "notes": [ { "category": "description", "text": "A deadlock vulnerability was found in `github.com/containers/storage`. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "containers/storage: DoS via malicious image", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability was first exposed in v1.23.8 of containers/storage (and subsequently fixed in v1.28.1) with this git commit [1].\n\n* In OpenShift Container Platform (OCP) only 4.7 contains a version of CRI-O (and openshift/ose-docker-builder) which uses a vulnerable version of containers/storage. Subsequently this has been addressed in OCP 4.7.7.\n\n* Red Hat Quay quay-builder-container is not affected because it uses a version of github.com/containers/storage earlier than v1.23.8\n\n* Red Hat Openshift Virtualization is not affected because all containers depending on github.com/containers/storage use a version earlier than v1.23.8\n\n* For Red Hat OpenStack Platform, because containers/storage is not directly used by the director-operator, no update will be provided at this time for the operator containers.\n\n[1] - https://github.com/containers/storage/blob/e9989a949a0d2c32fa82d3ff1076e33cfec58cb9/layers.go#L1332", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20291" }, { "category": "external", "summary": "RHBZ#1939485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20291", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20291" }, { "category": "external", "summary": "https://unit42.paloaltonetworks.com/cve-2021-20291/", "url": "https://unit42.paloaltonetworks.com/cve-2021-20291/" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containers/storage: DoS via malicious image" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7954" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.src", "AppStream-9.1.0.GA:podman-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-catatonit-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-debugsource-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-docker-2:4.2.0-3.el9.noarch", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-gvproxy-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-plugins-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-remote-debuginfo-2:4.2.0-3.el9.x86_64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.aarch64", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.ppc64le", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.s390x", "AppStream-9.1.0.GA:podman-tests-2:4.2.0-3.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" } ] }
rhsa-2021_3556
Vulnerability from csaf_redhat
Published
2021-09-16 18:38
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0
Notes
Topic
Release of OpenShift Serverless 1.17.0
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless
Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless client kn 1.16.0. This has been fixed (CVE-2021-3703).
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.17.0\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless\nOperator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nIt was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless client kn 1.16.0. This has been fixed (CVE-2021-3703).\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3556", "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983651" }, { "category": "external", "summary": "1983654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983654" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3556.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0", "tracking": { "current_release_date": "2024-09-18T04:20:08+00:00", "generator": { "date": "2024-09-18T04:20:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3556", "initial_release_date": "2021-09-16T18:38:06+00:00", "revision_history": [ { "date": "2021-09-16T18:38:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-16T18:38:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.17", "product": { "name": "Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.17::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.17.0-11" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.23.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.23.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.23.2-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.23.0-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.17.0-5" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.23.1-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.23.1-2" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64 as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le as a component of Red Hat OpenShift Serverless 1.17", "product_id": "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3703", "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992955" } ], "notes": [ { "category": "description", "text": "CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed for Serverless 1.16.0 and Serverless client kn 1.16.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is moderate as the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 are moderate. The score is assigned as per the highest score given in CVE-2021-27918 and CVE-2021-33196.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3703" }, { "category": "external", "summary": "RHBZ#1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3703", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703" } ], "release_date": "2021-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196" }, { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:34b135169d199195f822744cac8b63c044d1bd7f1822441ce6efa3bbda64df02_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:4269e0385e4b96143b2ce475d732dbc5dafdc2e147b5fa8ab2f5b0500a51bbaa_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/client-kn-rhel8@sha256:b18b0511a26fb96a857e1ba3d8852cd6ebc31f3b21584e0f3786d89abf7dfa96_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:0a7f4f8a9518619b4162ecdf8b98232337d188f2d82335a9c5485ba1496892e9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8988c3fd4e9b7d0c2fdac7376e05070d7498cefd79d3f9cb81f4aa55b037a47a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:dae731f1dccf0fa4936c3351fca24826b2ff7c8079fbcf5ae9e0f586c0b9923b_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:0d11ff784c05895b0c916b2c70031481367a4c49009432768a7a3c418f85bd0e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:da09e0156dea2f3901a09d0d94a517a2091e3fb18f4c63b501792991a3ab0ac2_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-controller-rhel8@sha256:fbaf9fb8e056c7c46ed1d521164f029e68587d34f40605dad2e1e573c22c908a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:c16cab4f04c74c5b9723a3b712299e7acd4f408609db9765d7af3e54ac932f86_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:d70d52b780854d4c62b56dbe3e6abe55fd066b9893f5983c8799400cd5d1f02a_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:e250f39c1e6ce3d97177e55dffe935346fd6b5d76dee489e96d4e561beb216a8_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:1ac479c08fc69742d2d27770c4af88f565c896b875be92d1d39ac4d155e2d125_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:61c68406601874a2725b4f03ff9e3a4b60a7fd2782ed36218322040bd39ae783_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:f3946ea3cd561a2b8aab6b2217340bd1b7cc749c281be0232f1318dbabaf4deb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:2b9cdeb0ad1f47ba71113023ee42d11a1611c805aeb24e811679df20e03d7be5_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:b87165f15578a234687f6c12491098929bcc99765b434c0f6ca174773ff7f218_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecf17d2c637ea572a389c2b6063f864f36731207a6caf1286af4f757c21e8d00_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:2c136e6d0639500a5358f3bab80a8115c9e7d4e8117cbcc47af5edfae3ecdc6f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:46214ff349eacde93dc734fcafc431d8b759bd4085ebd4865a857a640babcda3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:d24bc619dbbc7ab3cef56716eff20a7d981a17550cca1366226fd457913d7e71_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:14ed4104b5c777297cd01f2ac0944297a00957b46294b2a43c20ae5b42ea9939_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:e47b2304960a493575d0d906d1f36e9b36074a635027e79549e9180decc8385d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:f66340f961a3780dac832556f2fa6052525df18517b416b583b60830693952e7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:1cbe524e86c2ce4d3aca4f0e9cb457a904e0a42967f887486b7d050340c304bb_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:2985f25a55bbef3e9b1132df3f732afeb1a9b20aa7e2b9a81f0ccfb5ae67af20_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-mtping-rhel8@sha256:8ee9cb3b5c6d7e4813e4b7646c63cc244025236499f0d86280df350d106b5913_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:411c2642b1fdd7d360507a97a0982c6aa7b1ffb1041d2d494e03ce4eb3e13892_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:50ae3b13082a4d4e78b4779129959f20dad9c806bd740a8cec92cc72161df3a9_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:fd5335de5fb3385616c80804a1490ef3e748ce1a722b58127e82c67557837ad0_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3e6131b6422bf49885b0e793d028f579e6ba34203b931ddde18c3536b85f512f_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:44a79914d8295611fefdf752dbf705b1a803dca838f4996347c34eb371d5e987_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:cddb057d9b742bcf7417b57b8aa8e9f12ca860f9620082af286ee141491d7032_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:1033a2a20c522724ec74d8d8dc3caf9b6fdfd303981bde57c90ae3d96e0b7bb4_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:40df3b1ada84ee023135f17da714a80d10b8ef334457d77fb231cf162576cd46_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/eventing-webhook-rhel8@sha256:b9a035b796c150dcafa1abdd614aff3792475b3627c867324b96c9fcda205181_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:54acf59baba701b58d26ecdd725c476e1b9bb78cc5ead3dfd38984a92b23c9de_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:91a80f777f622696eeebc329149b46cdf6ce0cd0a8143ff9f33b9af16c16d94f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/ingress-rhel8-operator@sha256:c6de150fe6959815595f106c2542b677f54fc7003803e744736926e13516135e_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:2f9791c53e90c1ead14bfb641e3700968cac609df01034ae19758d7bc102997c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:7a83deaca80790f7cdf467dcfd528f2a30e01d88f927a2f1cc67aa23b5d94279_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:8523d48f47197c7619ec297fe8bbeec32cb78208690afa87fe2a68e6d057a878_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:0bd886e5ef8beafb4a0a2f1f50063081ad6e19637144f1fe8d8771cf5b31af06_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:57669ed17a2880a686fffa289b19f4d4aba662735a379562d0ff44daea6dbd71_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/knative-rhel8-operator@sha256:fe4cb08577e57fc7048ec014346dc809cd84eb1b47f75e0dc11b4156b44e9879_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:59fe5a01f4406267a8eb8afc4faf6c573792832dc4a180f4903fab684a029052_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:b97b3dbb2589c4ff15a13eb1316727c027a8095e503e7869b6ea4f251179eb49_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/kourier-control-rhel8@sha256:ea26c89440bbf4ef35cb4ec26cb9a6fe4ed9f4c5612390ef7a7313cc9a043b5f_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:6a79e6b485e1a8412027a949f405d98e974813e24aa793ba975bfa02c792f098_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:afc4d2975c6f9296b0be78fd41f7efe660266f233c93c9436425fb03889ccfc1_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-controller-rhel8@sha256:ce414a80f6941aafa98a114b0609eba687ad4f7610b790bffd298251ac6b024e_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:72d471d1f372d35c89a300430361f0a65b38363e0cf9903c2ead5941a4c77d5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:9d1fa68939d9e2c331d1f0f7a1e3d61f5500850fb5b68c5ff45f71a055b716ba_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b9bc1c8cf1198da29ca4e74fed491852072e79989b248b18088841a8f96d338c_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-operator-bundle@sha256:66de6e7914ad3bd8c8c52aff708c496a5374ed3f1ec1aed46f48b82c64808c0b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:b89ac22bf9b545b6b49c9e539595ebce5ffa5d6fab7cdf37cdfa06ac9e05de7a_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:e4ed980ae293889d35d05d6aa5ab0bd25dc0a7a4531dded620a9665d0ab77bfa_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serverless-rhel8-operator@sha256:fdb67a6a27a35581bc53ac9600d5b0c46822a8f9219cdaaeadaff255f263bc1d_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:439e2dcad6dc4e8c824746c7048fa5883f4643187b129c67008e273313ea4cfc_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:836127ff980c2889f08b9e7b219fe6d793356350efbcad864e10fe7e83839174_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-activator-rhel8@sha256:e36f3d11270bfff6ac8a97906bd44d89e654e83310a388cf49b5965d5aaab1c2_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:124786ed8cde0f033a8eef401c9d8a466ea3e2e1c5be1d476b799a8b654330e3_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:5f3d02e3fcb6505254d7b5f0eaf060b449df7cbc8432bb80cbde82a5a3f7e47d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:9a39a4f960425440c6d11d67afd3892004c41d308c77a5080e81b6015e699378_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:00169e24353fd41b7ce18138bb9057cf418dbf4c94acc27084880bfde0a49fb1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2172797a9800b70b87518cc05ac904a9aacd586881df9c703aa4134b55209a7b_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-autoscaler-rhel8@sha256:2e4cac0a0644b5e7e47c348d4ba1627af6d25cecae25f8502cd4f6ddaa69cb99_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9d0c6badb6d716ce62900a1eff76049e9dac445f97d78ff975c3e43b7bf28629_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:9dccc39aaba0266630afbdff3c138e54d9c7ca6807adbee6fc3abc601fdb511d_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-controller-rhel8@sha256:b51c3a2a441ca3ae5a96d745b9c4c3076996230f9b27ce9e037e8218f772a43e_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:011e9b049157f8a93ec69bce996193b14a9b8b5f97569f997fedb780513cb2fe_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:a7ebe5d055b50a1502f7ea292c590c5349b2d9338c1e357aeb761d758efe56c6_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:f02422946e56f7c65f124556ee50f20748e164836c4f51bbda499654b367ac89_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:0158a3861f4c642b09bb1a413bd734541b2f1143b44e09203f168e2082aeba5d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:22a24206dfca5df7d5a77ba2fc0c86a66b6c0bac3269fc733f5b54b497eec5f1_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:c025e2d0603eb50f2aec9059a1cdf170867aaf111f705cce039da7e5e87169b8_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:3bbb27f635a679ece32a6cb2440c429c1ab6ef3689172b22e698d58230c35782_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:46161600eec382a73e4b46f4733b0afcac6f1edcf5b976b04ea0013cea854584_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-queue-rhel8@sha256:c0eec13bc316c8099de682e9859e3cebfabab034edbb51ab201a875173c3a73c_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:382b691742d1a0564ccd34969abe1cf1f2466092702fe556b2740b783b816c6d_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:7fb2f0f6c06a08e6f8956a9bbb4f3c08a727f5429f6957ec633f490dd06d9550_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:89064eb5461b7f61d3cb34d64bdc087c2e6e8e41d79b0112308fdb50843e7c63_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:a618f2b5ad6299dca910e11d8524aaefee1523910b6e7ea67f5807bcbe2b6838_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:c56f34a9e63af26e719d2ca845adad2a1c4f4d43f540e83ee31193b1cdc237f2_ppc64le", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/serving-webhook-rhel8@sha256:ce961d028d879f5923cc6f1e0cc5d0445d70dbd839349a2d008c068a9d5eccd0_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:4cc6140b9bd2ee5096e9cbb8fcb95b12ce1bbce545cd7d73179c54bbaa34a2e0_amd64", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:a946cd92cb55b4f5b3be1b6db7de35b854bb90ae29b444c45088fe25c7b70ed7_s390x", "8Base-Openshift-Serverless-1.17:openshift-serverless-1/svls-must-gather-rhel8@sha256:fff21a3900194fa6c625deb80f68a82da6856dfdfc0ea0dba12e285dccaabf27_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3248
Vulnerability from csaf_redhat
Published
2021-08-31 15:01
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.8.9 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.8.9 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.9. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2021:3247
Security Fix(es):
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.8.9 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.9. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3247\n\nSecurity Fix(es):\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3248", "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1996683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996683" }, { "category": "external", "summary": "1996707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996707" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3248.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.8.9 packages and security update", "tracking": { "current_release_date": "2024-09-18T04:20:06+00:00", "generator": { "date": "2024-09-18T04:20:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3248", "initial_release_date": "2021-08-31T15:01:01+00:00", "revision_history": [ { "date": "2021-08-31T15:01:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T15:01:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "product": { "name": "openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "product_id": "openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@17.0.4-0.20210730151213.5b801be.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-tools-0:1.21.0-3.el8.src", "product": { "name": "cri-tools-0:1.21.0-3.el8.src", "product_id": "cri-tools-0:1.21.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.21.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-4.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el7?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "product_id": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-3.rhaos4.6.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_id": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.21.0-3.el8.x86_64", "product": { "name": "cri-tools-0:1.21.0-3.el8.x86_64", "product_id": "cri-tools-0:1.21.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.21.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.21.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.21.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-4.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-4.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-13.rhaos4.8.git52b3f98.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-3.rhaos4.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-3.rhaos4.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.21.0-3.el8.ppc64le", "product": { "name": "cri-tools-0:1.21.0-3.el8.ppc64le", "product_id": "cri-tools-0:1.21.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.21.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.21.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.21.0-3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-4.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-4.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_id": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_id": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_id": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-13.rhaos4.8.git52b3f98.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.21.0-3.el8.s390x", "product": { "name": "cri-tools-0:1.21.0-3.el8.s390x", "product_id": "cri-tools-0:1.21.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.21.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.21.0-3.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.s390x", "product_id": "cri-tools-debugsource-0:1.21.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.21.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.21.0-3.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-4.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-4.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product": { "name": "openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_id": "openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@17.0.4-0.20210730151213.5b801be.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product": { "name": "openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_id": "openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@17.0.4-0.20210730151213.5b801be.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product": { "name": "openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_id": "openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@17.0.4-0.20210730151213.5b801be.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product": { "name": "python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_id": "python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@17.0.4-0.20210730151213.5b801be.el8?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64" }, "product_reference": "cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.21.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le" }, "product_reference": "cri-tools-0:1.21.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.21.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x" }, "product_reference": "cri-tools-0:1.21.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.21.0-3.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src" }, "product_reference": "cri-tools-0:1.21.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.21.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64" }, "product_reference": "cri-tools-0:1.21.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.21.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.21.0-3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.21.0-3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src" }, "product_reference": "openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch" }, "product_reference": "openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch" }, "product_reference": "openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch" }, "product_reference": "openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" }, "product_reference": "python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3248" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3248" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3248" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3248" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-13.rhaos4.8.git52b3f98.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202108120034.p0.git.0d10c3f.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openstack-ironic-1:17.0.4-0.20210730151213.5b801be.el8.src", "8Base-RHOSE-4.8:openstack-ironic-api-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-common-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:openstack-ironic-conductor-1:17.0.4-0.20210730151213.5b801be.el8.noarch", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:python3-ironic-tests-1:17.0.4-0.20210730151213.5b801be.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-0:0.8.6-3.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.8:containernetworking-plugins-debuginfo-0:0.8.6-3.rhaos4.6.el7.x86_64", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.src", "8Base-RHOSE-4.8:cri-tools-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debuginfo-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.ppc64le", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.s390x", "8Base-RHOSE-4.8:cri-tools-debugsource-0:1.21.0-3.el8.x86_64", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.src", "8Base-RHOSE-4.8:golang-github-prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.ppc64le", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.s390x", "8Base-RHOSE-4.8:prometheus-promu-0:0.5.0-4.git642a960.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_5085
Vulnerability from csaf_redhat
Published
2021-12-13 15:29
Modified
2024-09-18 04:21
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update
Notes
Topic
Updated Multicloud Object Gateway command line (mcg) packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel >= 9 (CVE-2020-8565)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
These updated Multicloud Object Gateway command line (mcg) packages
include numerous bug fixes and enhancements. Space precludes documenting
all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most
significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Multicloud Object Gateway command line (mcg) packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.9.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n\n* kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9 (CVE-2020-8565)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated Multicloud Object Gateway command line (mcg) packages\ninclude numerous bug fixes and enhancements. Space precludes documenting\nall of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most\nsignificant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.9/html/4.9_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5085", "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1996033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996033" }, { "category": "external", "summary": "1998680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998680" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_5085.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:21:21+00:00", "generator": { "date": "2024-09-18T04:21:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:5085", "initial_release_date": "2021-12-13T15:29:11+00:00", "revision_history": [ { "date": "2021-12-13T15:29:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-13T15:29:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:21:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product": { "name": "Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product_id": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.9.0-28.61dcf87.5.9.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "relates_to_product_reference": "8Base-RH-ODF-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64 as a component of Red Hat OpenShift Data Foundation 4.9 on RHEL-8", "product_id": "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" }, "product_reference": "mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64", "relates_to_product_reference": "8Base-RH-ODF-4.9" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Patrick Rhomberg" ], "organization": "purelyapplied", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8565", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886638" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. In Kubernetes, if the logging level is to at least 9, authorization and bearer tokens will be written to log files. This can occur both in API server logs and client tool output like `kubectl`. Previously, CVE-2019-11250 was assigned for the same issue for logging levels of at least 4.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support LogLevels higher than 8 (via \u0027TraceAll\u0027), and is therefore not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8565" }, { "category": "external", "summary": "RHBZ#1886638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8565", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8565" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95623", "url": "https://github.com/kubernetes/kubernetes/issues/95623" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes: Incomplete fix for CVE-2019-11250 allows for token leak in logs when logLevel \u003e= 9" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.ppc64le", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.s390x", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.src", "8Base-RH-ODF-4.9:mcg-0:5.9.0-28.61dcf87.5.9.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_0947
Vulnerability from csaf_redhat
Published
2022-03-16 15:45
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.10.0 images:
RHEL-8-CNV-4.10
==============
kubevirt-velero-plugin-container-v4.10.0-8
virtio-win-container-v4.10.0-10
kubevirt-template-validator-container-v4.10.0-16
hostpath-csi-driver-container-v4.10.0-32
hostpath-provisioner-container-v4.10.0-32
hostpath-provisioner-operator-container-v4.10.0-62
cnv-must-gather-container-v4.10.0-110
virt-cdi-controller-container-v4.10.0-90
virt-cdi-apiserver-container-v4.10.0-90
virt-cdi-uploadserver-container-v4.10.0-90
virt-cdi-uploadproxy-container-v4.10.0-90
virt-cdi-operator-container-v4.10.0-90
virt-cdi-cloner-container-v4.10.0-90
virt-cdi-importer-container-v4.10.0-90
kubevirt-ssp-operator-container-v4.10.0-50
virt-api-container-v4.10.0-217
hyperconverged-cluster-webhook-container-v4.10.0-133
libguestfs-tools-container-v4.10.0-217
virt-handler-container-v4.10.0-217
virt-launcher-container-v4.10.0-217
virt-artifacts-server-container-v4.10.0-217
virt-controller-container-v4.10.0-217
node-maintenance-operator-container-v4.10.0-48
hyperconverged-cluster-operator-container-v4.10.0-133
virt-operator-container-v4.10.0-217
cnv-containernetworking-plugins-container-v4.10.0-49
kubemacpool-container-v4.10.0-49
bridge-marker-container-v4.10.0-49
ovs-cni-marker-container-v4.10.0-49
ovs-cni-plugin-container-v4.10.0-49
kubernetes-nmstate-handler-container-v4.10.0-49
cluster-network-addons-operator-container-v4.10.0-49
hco-bundle-registry-container-v4.10.0-696
Security Fix(es):
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.10.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.10.0 images:\n\nRHEL-8-CNV-4.10\n\n==============\n\nkubevirt-velero-plugin-container-v4.10.0-8\nvirtio-win-container-v4.10.0-10\nkubevirt-template-validator-container-v4.10.0-16\nhostpath-csi-driver-container-v4.10.0-32\nhostpath-provisioner-container-v4.10.0-32\nhostpath-provisioner-operator-container-v4.10.0-62\ncnv-must-gather-container-v4.10.0-110\nvirt-cdi-controller-container-v4.10.0-90\nvirt-cdi-apiserver-container-v4.10.0-90\nvirt-cdi-uploadserver-container-v4.10.0-90\nvirt-cdi-uploadproxy-container-v4.10.0-90\nvirt-cdi-operator-container-v4.10.0-90\nvirt-cdi-cloner-container-v4.10.0-90\nvirt-cdi-importer-container-v4.10.0-90\nkubevirt-ssp-operator-container-v4.10.0-50\nvirt-api-container-v4.10.0-217\nhyperconverged-cluster-webhook-container-v4.10.0-133\nlibguestfs-tools-container-v4.10.0-217\nvirt-handler-container-v4.10.0-217\nvirt-launcher-container-v4.10.0-217\nvirt-artifacts-server-container-v4.10.0-217\nvirt-controller-container-v4.10.0-217\nnode-maintenance-operator-container-v4.10.0-48\nhyperconverged-cluster-operator-container-v4.10.0-133\nvirt-operator-container-v4.10.0-217\ncnv-containernetworking-plugins-container-v4.10.0-49\nkubemacpool-container-v4.10.0-49\nbridge-marker-container-v4.10.0-49\novs-cni-marker-container-v4.10.0-49\novs-cni-plugin-container-v4.10.0-49\nkubernetes-nmstate-handler-container-v4.10.0-49\ncluster-network-addons-operator-container-v4.10.0-49\nhco-bundle-registry-container-v4.10.0-696\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0947", "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1760028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760028" }, { "category": "external", "summary": "1855182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855182" }, { "category": "external", "summary": "1906151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906151" }, { "category": "external", "summary": "1918294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918294" }, { "category": "external", "summary": "1935217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935217" }, { "category": "external", "summary": "1945586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945586" }, { "category": "external", "summary": "1958085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958085" }, { "category": "external", "summary": "1959039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959039" }, { "category": "external", "summary": "1975978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975978" }, { "category": "external", "summary": "1983079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983079" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1986970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986970" }, { "category": "external", "summary": "1987009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987009" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990061" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992231" }, { "category": "external", "summary": "1993454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993454" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "1997540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997540" }, { "category": "external", "summary": "1998300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998300" }, { "category": "external", "summary": "1999110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999110" }, { "category": "external", "summary": "1999636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999636" }, { "category": "external", "summary": "2000480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000480" }, { "category": "external", "summary": "2001984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001984" }, { "category": "external", "summary": "2001987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001987" }, { "category": "external", "summary": "2002272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002272" }, { "category": "external", "summary": "2003704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003704" }, { "category": "external", "summary": "2007397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007397" }, { "category": "external", "summary": "2008140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008140" }, { "category": "external", "summary": "2008411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008411" }, { "category": "external", "summary": "2008938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008938" }, { "category": "external", "summary": "2008949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008949" }, { "category": "external", "summary": "2008975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008975" }, { "category": "external", "summary": "2010540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010540" }, { "category": "external", "summary": "2010908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010908" }, { "category": "external", "summary": "2012920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012920" }, { "category": "external", "summary": "2013160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013160" }, { "category": "external", "summary": "2013455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013455" }, { "category": "external", "summary": "2015327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015327" }, { "category": "external", "summary": "2017255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017255" }, { "category": "external", "summary": "2018457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018457" }, { "category": "external", "summary": "2018925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018925" }, { "category": "external", "summary": "2018970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018970" }, { "category": "external", "summary": "2019053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019053" }, { "category": "external", "summary": "2021992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021992" }, { "category": "external", "summary": "2025295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025295" }, { "category": "external", "summary": "2025750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025750" }, { "category": "external", "summary": "2025878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025878" }, { "category": "external", "summary": "2026336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026336" }, { "category": "external", "summary": "2026363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026363" }, { "category": "external", "summary": "2026665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026665" }, { "category": "external", "summary": "2026667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026667" }, { "category": "external", "summary": "2027420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027420" }, { "category": "external", "summary": "2027922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027922" }, { "category": "external", "summary": "2029343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029343" }, { "category": "external", "summary": "2029767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029767" }, { "category": "external", "summary": "2030660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030660" }, { "category": "external", "summary": "2030686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030686" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2031033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031033" }, { "category": "external", "summary": "2031688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031688" }, { "category": "external", "summary": "2031727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031727" }, { "category": "external", "summary": "2031919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031919" }, { "category": "external", "summary": "2032045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032045" }, { "category": "external", "summary": "2032845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032845" }, { "category": "external", "summary": "2032873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032873" }, { "category": "external", "summary": "2032876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032876" }, { "category": "external", "summary": "2033240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033240" }, { "category": "external", "summary": "2033252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033252" }, { "category": "external", "summary": "2034544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034544" }, { "category": "external", "summary": "2035008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035008" }, { "category": "external", "summary": "2035324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035324" }, { "category": "external", "summary": "2035658", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035658" }, { "category": "external", "summary": "2035677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035677" }, { "category": "external", "summary": "2036220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036220" }, { "category": "external", "summary": "2036483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036483" }, { "category": "external", "summary": "2036605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036605" }, { "category": "external", "summary": "2037270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037270" }, { "category": "external", "summary": "2037290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037290" }, { "category": "external", "summary": "2037312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037312" }, { "category": "external", "summary": "2037421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037421" }, { "category": "external", "summary": "2038679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038679" }, { "category": "external", "summary": "2038825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038825" }, { "category": "external", "summary": "2038831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038831" }, { "category": "external", "summary": "2038985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038985" }, { "category": "external", "summary": "2039196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039196" }, { "category": "external", "summary": "2039208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039208" }, { "category": "external", "summary": "2039489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039489" }, { "category": "external", "summary": "2039683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039683" }, { "category": "external", "summary": "2039686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039686" }, { "category": "external", "summary": "2039691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039691" }, { "category": "external", "summary": "2040113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040113" }, { "category": "external", "summary": "2040115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040115" }, { "category": "external", "summary": "2041519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041519" }, { "category": "external", "summary": "2041530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041530" }, { "category": "external", "summary": "2042139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042139" }, { "category": "external", "summary": "2042799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042799" }, { "category": "external", "summary": "2042842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042842" }, { "category": "external", "summary": "2042856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042856" }, { "category": "external", "summary": "2042880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042880" }, { "category": "external", "summary": "2042908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042908" }, { "category": "external", "summary": "2044348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044348" }, { "category": "external", "summary": "2044398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044398" }, { "category": "external", "summary": "2046271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046271" }, { "category": "external", "summary": "2048227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048227" }, { "category": "external", "summary": "2048275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048275" }, { "category": "external", "summary": "2051105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051105" }, { "category": "external", "summary": "2051693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051693" }, { "category": "external", "summary": "2051968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051968" }, { "category": "external", "summary": "2052489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052489" }, { "category": "external", "summary": "2053027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053027" }, { "category": "external", "summary": "2058167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058167" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0947.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T14:40:11+00:00", "generator": { "date": "2024-09-18T14:40:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0947", "initial_release_date": "2022-03-16T15:45:58+00:00", "revision_history": [ { "date": "2022-03-16T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-16T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.10 for RHEL 8", "product": { "name": "CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.10::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.10.0-110" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.10.0-696" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.10.0-32" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.10.0-62" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.10.0-133" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.10.0-50" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.10.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.10.0-48" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.10.0-49" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_id": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.10.0-90" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.10.0-10" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.10.0-217" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.10.0-217" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "relates_to_product_reference": "8Base-CNV-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64 as a component of CNV 4.10 for RHEL 8", "product_id": "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64", "relates_to_product_reference": "8Base-CNV-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "known_not_affected": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-CNV-4.10:container-native-virtualization/bridge-marker@sha256:946d8c7ac55eed8d4b50feb9bd583e566280084ff76150a7f53314faa2b6ab67_amd64", "8Base-CNV-4.10:container-native-virtualization/cluster-network-addons-operator@sha256:21b1cd4fb9a395102e27ad7a291aee6aefdfac4b1524a7110636d0307d68a9c2_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-containernetworking-plugins@sha256:6a7f96677baedde6282675a7011d5965a07608cd596caaf7967f9a2823fe7d2f_amd64", "8Base-CNV-4.10:container-native-virtualization/cnv-must-gather-rhel8@sha256:62a0b34b90514c743a129270fdc85ed2ecffd6460606176080c6b5b91103f29f_amd64", "8Base-CNV-4.10:container-native-virtualization/hco-bundle-registry@sha256:35b29e8eb48d9818a1217d5b89e4dcb7a900c5c5e6ae3745683813c5708c86e9_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-csi-driver@sha256:f0519da54d7c1ebb8cca73f8222ae9b26bafd7f7bcf62bd84d256a86a6cfe3ab_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/kubemacpool@sha256:95e2d880c43a8333d9d351f391a0b65b3085fc0236908ab1df2d5aabea6069a8_amd64", "8Base-CNV-4.10:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:f396b60e29000834bcb4ebfa8ea9a8c67280f7cac080ecbbe7ff4b2e19b5897f_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-ssp-operator@sha256:092b22e2dab463306ccc3a3817046a4e327b6f16b1ce3f3619329436b81047f0_amd64", "8Base-CNV-4.10:container-native-virtualization/kubevirt-template-validator@sha256:4fd8d3c8ced084991de9d21a3ecdf0f512c6702d391ddf2a9817a5430c14a254_amd64", "8Base-CNV-4.10:container-native-virtualization/libguestfs-tools@sha256:c2b2dbf742429c80e3c2ac8a7a6844f971e8c16c63b3eb0cc878f306cb04d4cb_amd64", "8Base-CNV-4.10:container-native-virtualization/node-maintenance-operator@sha256:5e0d2f8647eb83d7b3b22a80b4593eee033b6d1485bd89ae9bc90bfeee953b56_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-marker@sha256:70d559676fa416e87062bc07f5415e62d1df8a20d5848992a54e691011a7aa7c_amd64", "8Base-CNV-4.10:container-native-virtualization/ovs-cni-plugin@sha256:344d9a9ba1564278bb4bde072bf65447c42b49fcaf819d7aa905b5adb7eaaa9e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-api@sha256:cb64c3aea1d7d2d00b04cdb1da051f084c6874a5908ec69f50a2a858d710341d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-artifacts-server@sha256:6060538f9ff00a856ba0f46cedf98c76a171aeea8b81f7f6c7a62326a7ea40b6_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-apiserver@sha256:a000a9d35271501bd20084427b4b6db736ba6b6a23ddfab75a2867dac9a9be84_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-controller@sha256:c8fc3c21b74d18c831e5a24d728b9d227feb09661cd2d9d68708880b21efb83e_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-handler@sha256:7a55175cbaa7049e32f7238ba6a79e3f893f345011db83139de635e9a9c5ccf0_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-launcher@sha256:54d0c8b98f312b9f1e8e2858cbc0fbb6eb59b85e87a2c84b92e7380965096ead_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-operator@sha256:44566f5489fe19a06e370360a85f47dfc9fcd8eed48e3400a8128b505ba7cc9f_amd64", "8Base-CNV-4.10:container-native-virtualization/virtio-win@sha256:b64dcceee917ec5fd626376421f2cd9312157a081b9462f5cf27d616926c2cc0_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:0ef594a814b548b3846062cfe900290b9f93be03d8f09937d540024d47becc60_amd64", "8Base-CNV-4.10:container-native-virtualization/hostpath-provisioner-rhel8@sha256:17d12998bd79152a96e82db905897a1dd3b5119141f9fd9b42750f213f99829f_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-operator@sha256:2d78cb1eb30b39cb09030811016c016a833b88c55d3f759bdae95bb77ecf384a_amd64", "8Base-CNV-4.10:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:a5cd7fc7bfd87376f2aad0f044a951f370442adbb463ff7a4c7f856382b11003_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-cloner@sha256:f30b342abc922126dbc657a20821529249458b27707b18aa4eda26ca37913cdc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-controller@sha256:62065ae5ac5c032dcac15ade3e06c51ec3a8d9eca3898adbd7887764613c3fbe_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-importer@sha256:19f3cd981dab062e8b3ca5c63a5ebe602e5555d6f4f896abcf109b89814bc3b4_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-operator@sha256:12acc4f0ccfb5f171aee6042052da551b2c46f35c99702d512b628c8b59812bc_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadproxy@sha256:1b0b35d082094c398dd87ac6d9ecc1a0d88f1e9205a476c4447f30a14ca9e80d_amd64", "8Base-CNV-4.10:container-native-virtualization/virt-cdi-uploadserver@sha256:e843ab661ec7189936c491a230b7fa5de91841bb514542c6e5a4df576e86d7a5_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" } ] }
rhsa-2021_3820
Vulnerability from csaf_redhat
Published
2021-10-19 20:23
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.8.15 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.15. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2021:3821
Security Fix(es):
* jenkins: improper permission checks allow canceling queue items and aborting builds (CVE-2021-21670)
* jenkins: session fixation vulnerability (CVE-2021-21671)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.8.15 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.15. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3821\n\nSecurity Fix(es):\n\n* jenkins: improper permission checks allow canceling queue items and aborting builds (CVE-2021-21670)\n\n* jenkins: session fixation vulnerability (CVE-2021-21671)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3820", "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "2013510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013510" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3820.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update", "tracking": { "current_release_date": "2024-09-18T04:20:00+00:00", "generator": { "date": "2024-09-18T04:20:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3820", "initial_release_date": "2021-10-19T20:23:34+00:00", "revision_history": [ { "date": "2021-10-19T20:23:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-10-19T20:23:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.289.3.1633554819-1.el8.src", "product": { "name": "jenkins-0:2.289.3.1633554819-1.el8.src", "product_id": "jenkins-0:2.289.3.1633554819-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1633554819-1.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product_id": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.8.1633555500-1.el8?arch=src" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.src", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.src", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product_id": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.12.1-2.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product_id": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.12.1-2.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_id": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.3-6.rhaos4.8.gite34bf50.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_id": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.12.0-140.el8fdp?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product": { "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product_id": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.289.3.1633554819-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.8.1633555500-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64" }, "product_reference": "butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1633554819-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch" }, "product_reference": "jenkins-0:2.289.3.1633554819-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.289.3.1633554819-1.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" }, "product_reference": "jenkins-0:2.289.3.1633554819-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-21670", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007749" } ], "notes": [ { "category": "description", "text": "Incorrect Authorization vulnerability was found in Jenkins. Users with Item/Cancel permission are able to cancel queue items and abort builds of jobs even when they do not have Item/Read permission.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: improper permission checks allow canceling queue items and aborting builds", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21670" }, { "category": "external", "summary": "RHBZ#2007749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21670" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2278" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "workaround", "details": "As a workaround on earlier versions of Jenkins, do not grant Item/Cancel permission to users who do not have Item/Read permission.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: improper permission checks allow canceling queue items and aborting builds" }, { "cve": "CVE-2021-21671", "cwe": { "id": "CWE-384", "name": "Session Fixation" }, "discovery_date": "2021-06-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007750" } ], "notes": [ { "category": "description", "text": "Session fixation vulnerability was found in Jenkins. The existing session on login process are not invalidated and this allows an attacker to gain potentially additional access on Jenkins by using social engineering attack techniques on a target user.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: session fixation vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21671" }, { "category": "external", "summary": "RHBZ#2007750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21671", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21671" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371", "url": "https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: session fixation vulnerability" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202109241839.p0.git.4bb45f8.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.3-6.rhaos4.8.gite34bf50.el8.x86_64", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-0:2.289.3.1633554819-1.el8.src", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.noarch", "8Base-RHOSE-4.8:jenkins-2-plugins-0:4.8.1633555500-1.el8.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.src", "8Base-RHOSE-4.8:ovn2.13-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-central-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-debugsource-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-host-debuginfo-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-0:20.12.0-140.el8fdp.x86_64", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.ppc64le", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.s390x", "8Base-RHOSE-4.8:ovn2.13-vtep-debuginfo-0:20.12.0-140.el8fdp.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.src", "8Base-RHOSE-4.8:butane-0:0.12.1-2.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:butane-debuginfo-0:0.12.1-2.rhaos4.8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_5072
Vulnerability from csaf_redhat
Published
2021-12-09 20:19
Modified
2024-09-18 04:21
Summary
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update
Notes
Topic
An update for etcd is now available for Red Hat OpenStack Platform 16.1
(Train).
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
A highly-available key value store for shared configuration
Security Fix(es):
* net/http: panic in ReadRequest and ReadResponse when reading a very large
header (CVE-2021-31525)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for etcd is now available for Red Hat OpenStack Platform 16.1\n(Train).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A highly-available key value store for shared configuration\n\nSecurity Fix(es):\n\n* net/http: panic in ReadRequest and ReadResponse when reading a very large\nheader (CVE-2021-31525)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5072", "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_5072.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update", "tracking": { "current_release_date": "2024-09-18T04:21:14+00:00", "generator": { "date": "2024-09-18T04:21:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:5072", "initial_release_date": "2021-12-09T20:19:15+00:00", "revision_history": [ { "date": "2021-12-09T20:19:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-09T20:19:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:21:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 16.1", "product": { "name": "Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:16.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.src", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.src", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-3.1.el8ost.1?arch=x86_64" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product_id": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-3.1.el8ost.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd@3.3.23-3.1.el8ost.1?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debugsource@3.3.23-3.1.el8ost.1?arch=ppc64le" } } }, { "category": "product_version", "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product_id": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/etcd-debuginfo@3.3.23-3.1.el8ost.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.src as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.src", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le" }, "product_reference": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "relates_to_product_reference": "8Base-RHOS-16.1" }, { "category": "default_component_of", "full_product_name": { "name": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64 as a component of Red Hat OpenStack Platform 16.1", "product_id": "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" }, "product_reference": "etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64", "relates_to_product_reference": "8Base-RHOS-16.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5072" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.src", "8Base-RHOS-16.1:etcd-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debuginfo-0:3.3.23-3.1.el8ost.1.x86_64", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.ppc64le", "8Base-RHOS-16.1:etcd-debugsource-0:3.3.23-3.1.el8ost.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" } ] }
rhsa-2021_3146
Vulnerability from csaf_redhat
Published
2021-08-12 01:53
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: ACS 3.64 security and enhancement update
Notes
Topic
Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS).
* Red Hat Product Security has rated this update as having a "Moderate" security impact.
* A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the references section.
Details
New Features
The release of RHACS 3.64 provides the following new features:
1. You can now use deployment and namespace annotations to define where RHACS sends the violation notifications when configuring your notifiers such as Slack, Microsoft Teams, Email, and others.
2. The Red Hat Advanced Cluster Security Operator now supports the ability to allow users to set the enforcement behavior of the admission controller as part of their custom resource.
3. RHACS now supports kernel modules for Ubuntu 16.04 LTS with extended security maintenance (ESM).
Security Fixes
The release of RHACS 3.64 provides the following security fixes:
* golang: `net` lookup functions may return invalid hostnames (CVE-2021-33195)
* golang: `net/http/httputil` ReverseProxy forwards connection headers if the first one is empty (CVE-2021-33197)
* golang: `math/big.Rat` may cause panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: `crypto/tls` certificate of the wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages in the references section.
System changes
The release of RHACS 3.64 includes the following system changes:
1. RHACS now pre-fixes the optional security context constraint name with `stackrox` to avoid global naming conflicts.
2. Previously, violations for `port forwards` and `exec` events did not contain information about the user who performed the action that generated the events. The violations now include the user context.
3. The cluster init bundles contain the secrets required for internal RHACS services to communicate with each other. You can delete these to rotate secrets, which have previously sometimes caused outages. This update includes a new deletion workflow that warns about the possible impact of deletion on your environment.
4. The OpenShift compliance operator uses `rpm` only for querying, and it does not install any packages. Therefore, this update includes a policy exception for this pod by default to reduce the violations count.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS).\n\n* Red Hat Product Security has rated this update as having a \"Moderate\" security impact.\n* A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the references section.", "title": "Topic" }, { "category": "general", "text": "New Features\nThe release of RHACS 3.64 provides the following new features:\n\n1. You can now use deployment and namespace annotations to define where RHACS sends the violation notifications when configuring your notifiers such as Slack, Microsoft Teams, Email, and others.\n2. The Red Hat Advanced Cluster Security Operator now supports the ability to allow users to set the enforcement behavior of the admission controller as part of their custom resource.\n3. RHACS now supports kernel modules for Ubuntu 16.04 LTS with extended security maintenance (ESM).\n\nSecurity Fixes\nThe release of RHACS 3.64 provides the following security fixes:\n\n* golang: `net` lookup functions may return invalid hostnames (CVE-2021-33195)\n* golang: `net/http/httputil` ReverseProxy forwards connection headers if the first one is empty (CVE-2021-33197)\n* golang: `math/big.Rat` may cause panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: `crypto/tls` certificate of the wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages in the references section.\n\nSystem changes\nThe release of RHACS 3.64 includes the following system changes:\n\n1. RHACS now pre-fixes the optional security context constraint name with `stackrox` to avoid global naming conflicts.\n2. Previously, violations for `port forwards` and `exec` events did not contain information about the user who performed the action that generated the events. The violations now include the user context.\n3. The cluster init bundles contain the secrets required for internal RHACS services to communicate with each other. You can delete these to rotate secrets, which have previously sometimes caused outages. This update includes a new deletion workflow that warns about the possible impact of deletion on your environment.\n4. The OpenShift compliance operator uses `rpm` only for querying, and it does not install any packages. Therefore, this update includes a policy exception for this pod by default to reduce the violations count.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3146", "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "category": "external", "summary": "https://docs.openshift.com/acs/release_notes/364-release-notes.html", "url": "https://docs.openshift.com/acs/release_notes/364-release-notes.html" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "ROX-9376", "url": "https://issues.redhat.com/browse/ROX-9376" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3146.json" } ], "title": "Red Hat Security Advisory: ACS 3.64 security and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:19:54+00:00", "generator": { "date": "2024-09-18T04:19:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3146", "initial_release_date": "2021-08-12T01:53:39+00:00", "revision_history": [ { "date": "2021-08-12T01:53:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-12T01:53:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHACS 3.64 for RHEL 8", "product": { "name": "RHACS 3.64 for RHEL 8", "product_id": "8Base-RHACS-3.64", "product_identification_helper": { "cpe": "cpe:/a:redhat:advanced_cluster_security:3.64::el8" } } } ], "category": "product_family", "name": "Red Hat Advanced Cluster Security for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64", "product": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64", "product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.64.0-1" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64", "product": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64", "product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.64.0-2" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64 as a component of RHACS 3.64 for RHEL 8", "product_id": "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" }, "product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64", "relates_to_product_reference": "8Base-RHACS-3.64" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64 as a component of RHACS 3.64 for RHEL 8", "product_id": "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" }, "product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64", "relates_to_product_reference": "8Base-RHACS-3.64" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "known_not_affected": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "known_not_affected": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "known_not_affected": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "known_not_affected": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "To take advantage of these new features and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.64", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-operator-bundle@sha256:7e7d2ee7951813e40decefd68e2a0a4dbcc32f81158de073340a2540f3e96441_amd64", "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.64:advanced-cluster-security/rhacs-rhel8-operator@sha256:edf1d4fec9c3b6651a2ba44741323a6abf5f5d891db27eba396c206a6bdbc31d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_0577
Vulnerability from csaf_redhat
Published
2022-03-28 09:34
Modified
2024-09-18 14:40
Summary
Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]
Notes
Topic
The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The components for Windows Container Support for Red Hat OpenShift 5.0.0 are now available. This product release includes bug fixes and a moderate security update for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n* golang: net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0577", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990573" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1992841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992841" }, { "category": "external", "summary": "1994859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994859" }, { "category": "external", "summary": "1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "2000772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000772" }, { "category": "external", "summary": "2001547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001547" }, { "category": "external", "summary": "2002961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002961" }, { "category": "external", "summary": "2005360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005360" }, { "category": "external", "summary": "2008601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008601" }, { "category": "external", "summary": "2015772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015772" }, { "category": "external", "summary": "2032048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032048" }, { "category": "external", "summary": "WINC-747", "url": "https://issues.redhat.com/browse/WINC-747" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0577.json" } ], "title": "Red Hat Security Advisory: Windows Container Support for Red Hat OpenShift 5.0.0 [security update]", "tracking": { "current_release_date": "2024-09-18T14:40:51+00:00", "generator": { "date": "2024-09-18T14:40:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0577", "initial_release_date": "2022-03-28T09:34:15+00:00", "revision_history": [ { "date": "2022-03-28T09:34:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-28T09:34:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T14:40:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_id": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-operator-bundle\u0026tag=v5.0.0-5" } } }, { "category": "product_version", "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_id": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "product_identification_helper": { "purl": "pkg:oci/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4-wincw/windows-machine-config-rhel8-operator\u0026tag=5.0.0-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" }, "product_reference": "openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-28851", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913333" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, an \"index out of range\" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28851" }, { "category": "external", "summary": "RHBZ#1913333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28851", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28851" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension" }, { "cve": "CVE-2020-28852", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913338" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org. In x/text, a \"slice bounds out of range\" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag", "title": "Vulnerability summary" }, { "category": "other", "text": "Below Red Hat products include the affected version of \u0027golang.org/x/text\u0027, however the language package is not being used and hence they are rated as having a security impact of Low. A future update may address this issue.\n\n* Red Hat OpenShift Container Storage 4\n* OpenShift ServiceMesh (OSSM)\n* Red Hat Gluster Storage 3\n* Windows Container Support for Red Hat OpenShift\n\nOnly three components in OpenShift Container Platform include the affected package, \u0027golang.org/x/text/language\u0027 , the installer, baremetal installer and thanos container images. All other components that include a version of \u0027golang.org/x/text\u0027 do not include the \u0027language\u0027 package and are therefore not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28852" }, { "category": "external", "summary": "RHBZ#1913338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28852", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28852" } ], "release_date": "2021-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995656" } ], "notes": [ { "category": "description", "text": "A race condition flaw was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash. The highest threat from this vulnerability is to Availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the impacted RHOSP packages.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF1.3, no update will be provided at this time for the STF1.3 sg-core-container. Additionally, because Service Telemetry Framework1.2 will be retiring soon, no update will be provided at this time for the STF1.2 smart-gateway-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36221" }, { "category": "external", "summary": "RHBZ#1995656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36221", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36221" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For Windows Machine Config Operator upgrades, see the following documentation: https://docs.openshift.com/container-platform/latest/windows_containers/windows-node-upgrades.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-operator-bundle@sha256:e6ad3e6e043aeeebc84da2071ca26bb1e89c071598b5088a8a7f237626491072_amd64", "8Base-RHOSE-4.10:openshift4-wincw/windows-machine-config-rhel8-operator@sha256:31af4d44c7cc4e00219a99451ce2e3523cdba90d575d58979ae1355c4350b6fe_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: panic due to racy read of persistConn after handler panic" } ] }
rhba-2021_2979
Vulnerability from csaf_redhat
Published
2021-08-11 05:14
Modified
2024-09-18 04:08
Summary
Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.23 packages update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.23 is now available with
updates to packages and images that fix several bugs.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.23. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2021:2977
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.23 is now available with\nupdates to packages and images that fix several bugs.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.23. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2977\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2021:2979", "url": "https://access.redhat.com/errata/RHBA-2021:2979" }, { "category": "external", "summary": "1988937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988937" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhba-2021_2979.json" } ], "title": "Red Hat Bug Fix Advisory: OpenShift Container Platform 4.7.23 packages update", "tracking": { "current_release_date": "2024-09-18T04:08:35+00:00", "generator": { "date": "2024-09-18T04:08:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHBA-2021:2979", "initial_release_date": "2021-08-11T05:14:36+00:00", "revision_history": [ { "date": "2021-08-11T05:14:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-11T05:14:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:08:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "product": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "product_id": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "product": { "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "product_id": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202107292242.p0.git.558d959.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.84-1.el8.src", "product": { "name": "redhat-release-coreos-0:47.84-1.el8.src", "product_id": "redhat-release-coreos-0:47.84-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.84-1.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "product": { "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "product_id": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202107292242.p0.git.558d959.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_id": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-7.rhaos4.7.git6287500.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-7.rhaos4.7.git6287500.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202107292242.p0.git.558d959.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.84-1.el8.x86_64", "product": { "name": "redhat-release-coreos-0:47.84-1.el8.x86_64", "product_id": "redhat-release-coreos-0:47.84-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.84-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-7.rhaos4.7.git6287500.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202107292242.p0.git.558d959.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-7.rhaos4.7.git6287500.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-7.rhaos4.7.git6287500.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202107292242.p0.git.558d959.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.84-1.el8.ppc64le", "product": { "name": "redhat-release-coreos-0:47.84-1.el8.ppc64le", "product_id": "redhat-release-coreos-0:47.84-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.84-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_id": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.4-7.rhaos4.7.git6287500.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_id": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.4-7.rhaos4.7.git6287500.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_id": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.4-7.rhaos4.7.git6287500.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-4.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202107292242.p0.git.558d959.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.84-1.el8.s390x", "product": { "name": "redhat-release-coreos-0:47.84-1.el8.s390x", "product_id": "redhat-release-coreos-0:47.84-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.84-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64" }, "product_reference": "cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src" }, "product_reference": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.84-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le" }, "product_reference": "redhat-release-coreos-0:47.84-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.84-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x" }, "product_reference": "redhat-release-coreos-0:47.84-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.84-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src" }, "product_reference": "redhat-release-coreos-0:47.84-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.84-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" }, "product_reference": "redhat-release-coreos-0:47.84-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:2979" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:2979" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:2979" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:2979" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2021:2979" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202107292046.p0.git.e1b19c2.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202107291238.p0.git.c7654fb.assembly.stream.el8.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el7.x86_64", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202107291238.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.src", "8Base-RHOSE-4.7:cri-o-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.4-7.rhaos4.7.git6287500.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-4.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202107292242.p0.git.8b4b094.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202107292242.p0.git.558d959.assembly.stream.el8.x86_64", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.84-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_2984
Vulnerability from csaf_redhat
Published
2021-08-10 07:52
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.8.4 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.4. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2021:2983
Security Fix(es):
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.8.4 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.8.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.4. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:2983\n\nSecurity Fix(es):\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: archive/zip: Malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.8 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.8/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2984", "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1988945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988945" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2984.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.8.4 bug fix and security update", "tracking": { "current_release_date": "2024-09-18T04:19:21+00:00", "generator": { "date": "2024-09-18T04:19:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2984", "initial_release_date": "2021-08-10T07:52:56+00:00", "revision_history": [ { "date": "2021-08-10T07:52:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-10T07:52:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.8", "product": { "name": "Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product_id": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product_id": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-7.rhaos4.8.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_id": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.21.2-8.rhaos4.8.git8d4264e.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.8", "product_id": "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.8 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.8/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-ansible-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-ansible-test-0:4.8.0-202107292023.p0.git.626f7a3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.8:atomic-openshift-service-idler-0:4.8.0-202107291413.p0.git.39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-kuryr-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-kuryr-cni-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-common-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:openshift-kuryr-controller-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch", "8Base-RHOSE-4.8:python3-kuryr-kubernetes-0:4.8.0-202107291413.p0.git.8a4c2d8.assembly.stream.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.src", "7Server-RH7-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el7.x86_64", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.src", "8Base-RHOSE-4.8:cri-o-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debuginfo-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.ppc64le", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.s390x", "8Base-RHOSE-4.8:cri-o-debugsource-0:1.21.2-8.rhaos4.8.git8d4264e.el8.x86_64", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.src", "8Base-RHOSE-4.8:ignition-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-debugsource-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.ppc64le", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.s390x", "8Base-RHOSE-4.8:ignition-validate-debuginfo-0:2.9.0-7.rhaos4.8.el8.x86_64", "8Base-RHOSE-4.8:openshift-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.src", "8Base-RHOSE-4.8:openshift-clients-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-clients-redistributable-0:4.8.0-202107292313.p0.git.1077b05.assembly.stream.el8.x86_64", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.s390x", "8Base-RHOSE-4.8:openshift-hyperkube-0:4.8.0-202107300027.p0.git.38b3ecc.assembly.stream.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3598
Vulnerability from csaf_redhat
Published
2021-09-21 11:04
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.8.2 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.8.2 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.8.2 images:
RHEL-8-CNV-4.8
==============
kubevirt-vmware-container-v4.8.2-1
node-maintenance-operator-container-v4.8.2-1
bridge-marker-container-v4.8.2-1
kubemacpool-container-v4.8.2-1
virtio-win-container-v4.8.2-1
kubevirt-v2v-conversion-container-v4.8.2-1
hostpath-provisioner-container-v4.8.2-1
kubernetes-nmstate-handler-container-v4.8.2-1
cluster-network-addons-operator-container-v4.8.2-1
cnv-containernetworking-plugins-container-v4.8.2-1
hyperconverged-cluster-operator-container-v4.8.2-2
hostpath-provisioner-operator-container-v4.8.2-1
ovs-cni-marker-container-v4.8.2-1
hyperconverged-cluster-webhook-container-v4.8.2-2
ovs-cni-plugin-container-v4.8.2-1
kubevirt-template-validator-container-v4.8.2-2
kubevirt-ssp-operator-container-v4.8.2-2
cnv-must-gather-container-v4.8.2-3
vm-import-virtv2v-container-v4.8.2-4
vm-import-operator-container-v4.8.2-4
vm-import-controller-container-v4.8.2-4
virt-cdi-cloner-container-v4.8.2-2
virt-cdi-controller-container-v4.8.2-2
virt-cdi-operator-container-v4.8.2-2
virt-cdi-uploadproxy-container-v4.8.2-2
virt-cdi-uploadserver-container-v4.8.2-2
virt-cdi-apiserver-container-v4.8.2-2
virt-cdi-importer-container-v4.8.2-2
virt-launcher-container-v4.8.2-5
virt-api-container-v4.8.2-5
virt-handler-container-v4.8.2-5
virt-controller-container-v4.8.2-5
virt-operator-container-v4.8.2-5
hco-bundle-registry-container-v4.8.2-17
Security Fix(es):
* golang: net: lookup functions may return invalid host names
(CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if
first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error
if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to
panic (CVE-2021-34558)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.8.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.2 images:\n\nRHEL-8-CNV-4.8\n==============\nkubevirt-vmware-container-v4.8.2-1\nnode-maintenance-operator-container-v4.8.2-1\nbridge-marker-container-v4.8.2-1\nkubemacpool-container-v4.8.2-1\nvirtio-win-container-v4.8.2-1\nkubevirt-v2v-conversion-container-v4.8.2-1\nhostpath-provisioner-container-v4.8.2-1\nkubernetes-nmstate-handler-container-v4.8.2-1\ncluster-network-addons-operator-container-v4.8.2-1\ncnv-containernetworking-plugins-container-v4.8.2-1\nhyperconverged-cluster-operator-container-v4.8.2-2\nhostpath-provisioner-operator-container-v4.8.2-1\novs-cni-marker-container-v4.8.2-1\nhyperconverged-cluster-webhook-container-v4.8.2-2\novs-cni-plugin-container-v4.8.2-1\nkubevirt-template-validator-container-v4.8.2-2\nkubevirt-ssp-operator-container-v4.8.2-2\ncnv-must-gather-container-v4.8.2-3\nvm-import-virtv2v-container-v4.8.2-4\nvm-import-operator-container-v4.8.2-4\nvm-import-controller-container-v4.8.2-4\nvirt-cdi-cloner-container-v4.8.2-2\nvirt-cdi-controller-container-v4.8.2-2\nvirt-cdi-operator-container-v4.8.2-2\nvirt-cdi-uploadproxy-container-v4.8.2-2\nvirt-cdi-uploadserver-container-v4.8.2-2\nvirt-cdi-apiserver-container-v4.8.2-2\nvirt-cdi-importer-container-v4.8.2-2\nvirt-launcher-container-v4.8.2-5\nvirt-api-container-v4.8.2-5\nvirt-handler-container-v4.8.2-5\nvirt-controller-container-v4.8.2-5\nvirt-operator-container-v4.8.2-5\nhco-bundle-registry-container-v4.8.2-17\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names\n(CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if\nfirst one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error\nif passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to\npanic (CVE-2021-34558)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3598", "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1953485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953485" }, { "category": "external", "summary": "1957791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957791" }, { "category": "external", "summary": "1972819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972819" }, { "category": "external", "summary": "1982143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1982143" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1990065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990065" }, { "category": "external", "summary": "1991460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991460" }, { "category": "external", "summary": "1993122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993122" }, { "category": "external", "summary": "1995050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995050" }, { "category": "external", "summary": "1996110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996110" }, { "category": "external", "summary": "1996660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996660" }, { "category": "external", "summary": "1997668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997668" }, { "category": "external", "summary": "1998818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998818" }, { "category": "external", "summary": "1998983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1998983" }, { "category": "external", "summary": "2000021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000021" }, { "category": "external", "summary": "2001038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001038" }, { "category": "external", "summary": "2001069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001069" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3598.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.2 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:19:32+00:00", "generator": { "date": "2024-09-18T04:19:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3598", "initial_release_date": "2021-09-21T11:04:54+00:00", "revision_history": [ { "date": "2021-09-21T11:04:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-21T11:04:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.8 for RHEL 8", "product": { "name": "CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.8.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.8.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.8.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.8.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v4.8.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.8.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.8.2-4" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.8.2-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64", "relates_to_product_reference": "8Base-CNV-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "known_not_affected": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/virt/upgrading-virt.html", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "known_not_affected": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/virt/upgrading-virt.html", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "known_not_affected": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/virt/upgrading-virt.html", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3598" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "known_not_affected": [ "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/virt/upgrading-virt.html", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:ce09250716878051a735ea724d5ebfcfd1780fe91704b3d1acc257ad02335d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:5db8cd594cdefe443a1486198cf94b1e2f02fc9ca63d011db223f8d8ed1702a4_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:c4420881f20bef3220aba07c3aafde026fb8140b9923eb7ba6ab408255fe2ee3_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:90d877601ec49ca78f99bedeeae84e2f6ffed86dce045ee4654d6673746e1ac4_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:7079bbfe8b4d63a9550c557ccd135b6423d0509c02bec9b30f75589365b55f10_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:405369ff10980b6f501f2a6f9920ead472d236fbcac616d836a07cc96092900e_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:ec39e0dc1c3d6c0912b1da5b9dc36682a5a702cd64978ec6d0b34651942944ca_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3555
Vulnerability from csaf_redhat
Published
2021-09-16 15:24
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.17.0
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.17.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.17.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 (CVE-2021-3703)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic
(CVE-2021-34558)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.17.0\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.17.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.17.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196 (CVE-2021-3703)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3555", "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1983656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983656" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3555.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0", "tracking": { "current_release_date": "2024-09-18T04:20:01+00:00", "generator": { "date": "2024-09-18T04:20:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3555", "initial_release_date": "2021-09-16T15:24:35+00:00", "revision_history": [ { "date": "2021-09-16T15:24:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-09-16T15:24:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product_id": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.23.2-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.23.2-1.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3703", "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992955" } ], "notes": [ { "category": "description", "text": "CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed for Serverless 1.16.0 and Serverless client kn 1.16.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is moderate as the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 are moderate. The score is assigned as per the highest score given in CVE-2021-27918 and CVE-2021-33196.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3703" }, { "category": "external", "summary": "RHBZ#1992955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3703", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3703" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3703" } ], "release_date": "2021-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "serverless: incomplete fix for CVE-2021-27918 / CVE-2021-31525 / CVE-2021-33196" }, { "cve": "CVE-2021-27918", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1937901" } ], "notes": [ { "category": "description", "text": "An infinite loop vulnerability was found in golang. If an application defines a custom token parser initializing with `xml.NewTokenDecoder` it is possible for the parsing loop to never return. An attacker could potentially craft a malicious XML document which has an XML element with `EOF` within it, causing the parsing application to endlessly loop, resulting in a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), Red Hat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization all bundle vulnerable versions of the golang standard library (stdlib). However, no component within each product utilizes the function xml.NewTokenDecoder which is a requirement to be vulnerable. Hence, all affected components are marked as \"Will not fix\". Additionally no OCP container has been listed, as nearly all available containers are compiled with an affected version of Go, but do not utilize the function xml.NewTokenDecoder.\n\nRed Hat Ceph Storage (RHCS), Red Hat Gluster Storage 3 and OpenShift Container Storage 4 also bundles a vulnerable version of golang standard library \u0027encoding/xml\u0027, but does not utilize the function xml.NewTokenDecoder, and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27918" }, { "category": "external", "summary": "RHBZ#1937901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27918" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at: https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.23.2-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3361
Vulnerability from csaf_redhat
Published
2021-08-31 08:09
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update
Notes
Topic
An update is now available for the Migration Toolkit for Containers (MTC) 1.5.1.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security fixes:
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for the Migration Toolkit for Containers (MTC) 1.5.1.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate\nKubernetes resources, persistent volume data, and internal container images\nbetween OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity fixes:\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3361", "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1996125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996125" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3361.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:19:35+00:00", "generator": { "date": "2024-09-18T04:19:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3361", "initial_release_date": "2021-08-31T08:09:25+00:00", "revision_history": [ { "date": "2021-08-31T08:09:25+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-31T08:09:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.5", "product": { "name": "8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el8" } } }, { "category": "product_name", "name": "7Server-RHMTC-1.5", "product": { "name": "7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.5::el7" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.5.1-13" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.5.1-22" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.5.1-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.5.1-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.5.1-7" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.5.1-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.5.1-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64 as a component of 7Server-RHMTC-1.5", "product_id": "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "relates_to_product_reference": "7Server-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64 as a component of 8Base-RHMTC-1.5", "product_id": "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "known_not_affected": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/migration-toolkit-for-containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHMTC-1.5:rhmtc/openshift-migration-operator-bundle@sha256:68ed55736af9e054b777315600f433f8ac304833f48a3765cc27d0355a3b4617_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-controller-rhel8@sha256:6731c74dd154dcb40ace9d4876b77dc2610bcc717898be03ea33ad85a5078256_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:a7062c6466b6f2467301de98bb78af45c4ec7fb75dfcf68b2ed0a0b354777336_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-log-reader-rhel8@sha256:3ed94a3661d0cdcf06921fd552c044f8e02d640d5fbeb240ebcd0068d7c07873_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:7ed3b473e12d7eaa759dd1de5c75ce02b7bf6df1a4c31962cfa9da5637c2614d_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-ui-rhel8@sha256:8b29a1dd23200af0f2c7676f1cbf94d19fab0a3287aa101d79a9787b1bc07e88_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:17612015e15fbb61aaadf269cb2655a2fa080e2f0c9276ad652df2fd422e29c6_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:b53c5737296e969abcd39f3bf7a7b4731681c261c6232c96f2f0576a8ea2bb0f_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:5f350b33ea12fa549b6b27e8b5ca3a9cf4f2c6d06518e5b3cf25d5ef47b0c9f8_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.5:rhmtc/openshift-migration-must-gather-rhel8@sha256:5125c461191008d42dd3e44e30910e91dab1cfb6e3862dde5d3f7eb2b9ab981a_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-registry-rhel8@sha256:b98147918ef12962891c490a3050cd5851efb010481666c62916684126f36826_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:1e26af4b60c8876a6557bb015b89e0770b453d8a363c2af2f6432f1ad9758463_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-migration-velero-rhel8@sha256:0c99bbdd72f8a9896c7e104cf4fe3cf4280a5fdfe12adc3e82f23eb5b6e789c1_amd64", "8Base-RHMTC-1.5:rhmtc/openshift-velero-plugin-rhel8@sha256:0ff51536432d4925bf43e19bca1141391d48d26c4bf4227f6131a0b1b3781ce1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3759
Vulnerability from csaf_redhat
Published
2021-10-18 17:26
Modified
2021-10-18 17:26
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.0 bug fix and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.0. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:3758
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation (CVE-2021-26539)
* sanitize-html: improper validation of hostnames set by the "allowedIframeHostnames" option can lead to bypass hostname whitelist for iframe element (CVE-2021-26540)
* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
* nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string (CVE-2021-29059)
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* helm: information disclosure vulnerability (CVE-2021-32690)
* golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
This update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-x86_64
The image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-s390x
The image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-ppc64le
The image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61
All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.9.0. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHSA-2021:3758\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation (CVE-2021-26539)\n\n* sanitize-html: improper validation of hostnames set by the \"allowedIframeHostnames\" option can lead to bypass hostname whitelist for iframe element (CVE-2021-26540)\n\n* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)\n\n* nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string (CVE-2021-29059)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\n* golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-x86_64\n\nThe image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61\n\n(For s390x architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-s390x\n\nThe image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61\n\n(For ppc64le architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.0-ppc64le\n\nThe image digest is sha256:d262a12de33125907e0b75a5ea34301dd27c4a6bde8295f6b922411f07623e61\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3759", "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3759.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.0 bug fix and security update", "tracking": { "current_release_date": "2021-10-18T17:26:00Z", "generator": { "date": "2023-07-01T05:08:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2021:3759", "initial_release_date": "2021-10-18T17:26:00Z", "revision_history": [ { "date": "2021-10-18T17:26:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "product": { "name": "openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "product_id": "openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream" } }, { "category": "product_version", "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "product": { "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "product_id": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream" } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "product": { "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "product_id": "openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream" } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "product": { "name": "openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "product_id": "openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "product": { "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "product_id": "openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "product": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "product": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "product_id": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "product": { "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "product_id": "openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product_id": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "product": { "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "product_id": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "product": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "product_id": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "product": { "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "product_id": "openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "product": { "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "product_id": "openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "product": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "product_id": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "product": { "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "product_id": "openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "product": { "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "product_id": "openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "product": { "name": "openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "product_id": "openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "product": { "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "product_id": "openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "product": { "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "product_id": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "product": { "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "product_id": "openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "product_id": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "product_id": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "product": { "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "product_id": "openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "product": { "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "product_id": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "product": { "name": "openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "product_id": "openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "product": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "product_id": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "product_id": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "product": { "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "product_id": "openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "product": { "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "product_id": "openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "product": { "name": "openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "product_id": "openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "product": { "name": "openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "product_id": "openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "product": { "name": "openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "product_id": "openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "product": { "name": "openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "product_id": "openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "product": { "name": "openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "product_id": "openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "product": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "product_id": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "product_id": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "product": { "name": "openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "product_id": "openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product_id": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "product_id": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "product_id": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "product": { "name": "openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "product_id": "openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "product_id": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "product": { "name": "openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "product_id": "openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product_id": "openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "product": { "name": "openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "product_id": "openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "product": { "name": "openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "product_id": "openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "product": { "name": "openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "product_id": "openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "product": { "name": "openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "product_id": "openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "product": { "name": "openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "product_id": "openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "product": { "name": "openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "product_id": "openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "product": { "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "product_id": "openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product": { "name": "openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product_id": "openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product": { "name": "openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "product_id": "openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "product": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "product": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "product_id": "openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "product": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "product": { "name": "openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "product_id": "openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "product": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product": { "name": "openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "product_id": "openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "product": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "product_id": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "product": { "name": "openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "product_id": "openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "product": { "name": "openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "product_id": "openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "product": { "name": "openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "product_id": "openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "product": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "product_id": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "product": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "product_id": "openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "product": { "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "product_id": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "product": { "name": "openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "product_id": "openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "product": { "name": "openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "product_id": "openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "product": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "product_id": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "product": { "name": "openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "product_id": "openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "product": { "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "product_id": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "product": { "name": "openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "product_id": "openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "product_id": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "product": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "product_id": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "product_id": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "product": { "name": "openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "product_id": "openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "product_id": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "product_id": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "product": { "name": "openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "product_id": "openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "product": { "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "product_id": "openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "product_id": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "product_id": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "product_id": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "product": { "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "product_id": "openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "product": { "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "product_id": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "product": { "name": "openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "product_id": "openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "product": { "name": "openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "product_id": "openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "product": { "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "product_id": "openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "product": { "name": "openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "product_id": "openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "product": { "name": "openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "product_id": "openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "product": { "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "product_id": "openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "product": { "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "product_id": "openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "product": { "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "product_id": "openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "product": { "name": "openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "product_id": "openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "product": { "name": "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "product_id": "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "product": { "name": "openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "product_id": "openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "product": { "name": "openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "product_id": "openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "product": { "name": "openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "product_id": "openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "product": { "name": "openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "product_id": "openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "product": { "name": "openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "product_id": "openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product": { "name": "openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "product_id": "openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream", "product": { "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream", "product_id": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream" }, "product_reference": "openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream" }, "product_reference": "openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream" }, "product_reference": "openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream" }, "product_reference": "openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream" }, "product_reference": "openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream" }, "product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream" }, "product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream" }, "product_reference": "openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream" }, "product_reference": "openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream" }, "product_reference": "openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream" }, "product_reference": "openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream" }, "product_reference": "openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream" }, "product_reference": "openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream" }, "product_reference": "openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream" }, "product_reference": "openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream" }, "product_reference": "openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream" }, "product_reference": "openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream" }, "product_reference": "openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream" }, "product_reference": "openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream" }, "product_reference": "openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream" }, "product_reference": "openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream" }, "product_reference": "openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream" }, "product_reference": "openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream" }, "product_reference": "openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream" }, "product_reference": "openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8" }, "product_reference": "openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream" }, "product_reference": "openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream" }, "product_reference": "openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream" }, "product_reference": "openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream" }, "product_reference": "openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" }, "product_reference": "openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream" }, "product_reference": "openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream" }, "product_reference": "openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream" }, "product_reference": "openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream" }, "product_reference": "openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" }, "product_reference": "openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream" }, "product_reference": "openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream" }, "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream" }, "product_reference": "openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream" }, "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream" }, "product_reference": "openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream" }, "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream" }, "product_reference": "openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream" }, "product_reference": "openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream" }, "product_reference": "openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream" }, "product_reference": "openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream" }, "product_reference": "openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream" }, "product_reference": "openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream" }, "product_reference": "openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream" }, "product_reference": "openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream" }, "product_reference": "openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream" }, "product_reference": "openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream" }, "product_reference": "openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream" }, "product_reference": "openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream" }, "product_reference": "openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream" }, "product_reference": "openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream" }, "product_reference": "openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream" }, "product_reference": "openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream" }, "product_reference": "openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream" }, "product_reference": "openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream" }, "product_reference": "openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream" }, "product_reference": "openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream" }, "product_reference": "openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream" }, "product_reference": "openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream" }, "product_reference": "openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" }, "product_reference": "openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream" }, "product_reference": "openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream" }, "product_reference": "openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream" }, "product_reference": "openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream" }, "product_reference": "openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream" }, "product_reference": "openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream" }, "product_reference": "openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" }, { "category": "external", "summary": "CVE-2021-3121", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "bz#1921650: CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "release_date": "2021-01-11T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-01-28T00:00:00Z", "details": "Important" } ], "title": "CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-26539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the \"allowedIframeHostnames\" option.", "title": "Vulnerability description" }, { "category": "summary", "text": "sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26539", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539" }, { "category": "external", "summary": "CVE-2021-26539", "url": "https://access.redhat.com/security/cve/CVE-2021-26539" }, { "category": "external", "summary": "bz#1932362: CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "release_date": "2021-01-22T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-02-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation" }, { "cve": "CVE-2021-26540", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1932323" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\".", "title": "Vulnerability description" }, { "category": "summary", "text": "sanitize-html: improper validation of hostnames set by the \"allowedIframeHostnames\" option can lead to bypass hostname whitelist for iframe element", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26540", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26540" }, { "category": "external", "summary": "CVE-2021-26540", "url": "https://access.redhat.com/security/cve/CVE-2021-26540" }, { "category": "external", "summary": "bz#1932323: CVE-2021-26540 sanitize-html: improper validation of hostnames set by the \"allowedIframeHostnames\" option can lead to bypass hostname whitelist for iframe element", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932323" } ], "release_date": "2021-01-26T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-02-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-26540 sanitize-html: improper validation of hostnames set by the \"allowedIframeHostnames\" option can lead to bypass hostname whitelist for iframe element" }, { "cve": "CVE-2021-28092", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-03-12T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1939103" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in is-svg package. A malicious string provided by an attacker may lead to Regular Expression Denial of Service (ReDoS).\r\nThe highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-is-svg: ReDoS via malicious string", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28092", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28092" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28092", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28092" }, { "category": "external", "summary": "CVE-2021-28092", "url": "https://access.redhat.com/security/cve/CVE-2021-28092" }, { "category": "external", "summary": "bz#1939103: CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939103" } ], "release_date": "2021-03-11T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-03-12T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string" }, { "cve": "CVE-2021-29059", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-06-22T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1974839" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in IS-SVG where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29059", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29059" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29059", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29059" }, { "category": "external", "summary": "CVE-2021-29059", "url": "https://access.redhat.com/security/cve/CVE-2021-29059" }, { "category": "external", "summary": "bz#1974839: CVE-2021-29059 nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974839" } ], "release_date": "2021-06-21T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-06-22T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-29059 nodejs-is-svg: Regular expression denial of service if the application is provided and checks a crafted invalid SVG string" }, { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" }, { "category": "external", "summary": "CVE-2021-31525", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "bz#1958341: CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" } ], "release_date": "2021-04-22T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-05-06T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "information disclosure vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" }, { "category": "external", "summary": "CVE-2021-32690", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "bz#1978144: information disclosure vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" } ], "release_date": "2021-06-16T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8" ] } ], "threats": [ { "category": "impact", "date": "2021-06-17T00:00:00Z", "details": "Moderate" } ], "title": "information disclosure vulnerability" }, { "cve": "CVE-2021-33194", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-05-20T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1963232" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in golang. An attacker can craft an input to ParseFragment within parse.go that would cause it to enter an infinite loop and never return. The greatest threat to the system is of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: x/net/html: infinite loop in ParseFragment", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33194" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/28x0nthP-c8/m/KqWVTjsnBAAJ", "url": "https://groups.google.com/g/golang-dev/c/28x0nthP-c8/m/KqWVTjsnBAAJ" }, { "category": "external", "summary": "CVE-2021-33194", "url": "https://access.redhat.com/security/cve/CVE-2021-33194" }, { "category": "external", "summary": "bz#1963232: CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963232" } ], "release_date": "2021-05-20T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-05-20T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "category": "external", "summary": "CVE-2021-33195", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "bz#1989564: CVE-2021-33195 golang: net: lookup functions may return invalid host names", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" } ], "release_date": "2021-05-18T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-08-02T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-33195 golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "category": "external", "summary": "CVE-2021-33197", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "bz#1989570: CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" } ], "release_date": "2021-05-21T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-08-02T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-33197 golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "category": "external", "summary": "CVE-2021-33198", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "bz#1989575: CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" } ], "release_date": "2021-03-10T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-08-02T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-33198 golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/driver-toolkit-rhel8:v4.9.0-202110052311.p0.git.25c3513.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-alt-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/egress-router-cni-rhel8:v4.9.0-202109302317.p0.git.099b756.assembly.stream", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8:v4.9.0-202110081859.p0.git.ed0b846.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.18d82a6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.e8e2cb3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.9.0-202109302317.p0.git.26f1b6f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-machine-controllers:v4.9.0-202109302317.p0.git.f5013d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.9.0-202109302317.p0.git.175f98f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-cloud-node-manager-rhel8:v4.9.0-202109302317.p0.git.c02678d.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.60fd0ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-disk-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ade7373.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-azure-machine-controllers:v4.9.0-202109302317.p0.git.c689e78.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-machine-controllers:v4.9.0-202109302317.p0.git.1c81cab.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-rhel8-operator:v4.9.0-202109302317.p0.git.cf45440.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-baremetal-runtimecfg-rhel8:v4.9.0-202109302317.p0.git.066cf9f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cli:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cloud-credential-operator:v4.9.0-202109302317.p0.git.0d83e9b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-authentication-operator:v4.9.0-202109302317.p0.git.b6c02e6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler-operator:v4.9.0-202109302317.p0.git.4a69154.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-autoscaler:v4.9.0-202109302016.p0.git.68fe93a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8:v4.9.0-202109302317.p0.git.fc2865a.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-bootstrap:v4.9.0-202109302317.p0.git.7e074a7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8:v4.9.0-202109302317.p0.git.2b9246c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-config-operator:v4.9.0-202109302317.p0.git.f901f5b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.9.0-202110010218.p0.git.c750d4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-dns-operator:v4.9.0-202109302317.p0.git.083d37c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-etcd-rhel8-operator:v4.9.0-202109302317.p0.git.a6820f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-image-registry-operator:v4.9.0-202110010218.p0.git.48485bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-ingress-operator:v4.9.0-202109302317.p0.git.9aa4433.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-apiserver-operator:v4.9.0-202109302317.p0.git.ea2ec3b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-controller-manager-operator:v4.9.0-202109302317.p0.git.7766edf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-scheduler-operator:v4.9.0-202109302317.p0.git.c90e03f.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.9.0-202109302317.p0.git.c45ac14.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-machine-approver:v4.9.0-202109302317.p0.git.093c444.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator:v4.9.0-202109302317.p0.git.79cdf68.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-network-operator:v4.9.0-202109302317.p0.git.8437b07.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-node-tuning-operator:v4.9.0-202109302317.p0.git.9284381.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-apiserver-operator:v4.9.0-202109302317.p0.git.4cc29cf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-openshift-controller-manager-operator:v4.9.0-202109302317.p0.git.3015cb8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-policy-controller-rhel8:v4.9.0-202109302317.p0.git.8fbffaf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-samples-operator:v4.9.0-202109302016.p0.git.49a97d3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-storage-operator:v4.9.0-202109302317.p0.git.2e76e02.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-update-keys:v4.9.0-202109302317.p0.git.3e20043.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-cluster-version-operator:v4.9.0-202110081830.p0.git.1f15159.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-configmap-reloader:v4.9.0-202109302317.p0.git.b84b5bf.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console-operator:v4.9.0-202110010218.p0.git.b805832.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-console:v4.9.0-202110130449.p0.git.8c077e4.assembly.rc.8", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-alt-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-container-networking-plugins-rhel8:v4.9.0-202109302317.p0.git.44a4913.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-coredns:v4.9.0-202109302317.p0.git.3cb11c0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8-operator:v4.9.0-202109302317.p0.git.fd2d838.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-manila-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-driver-nfs-rhel8:v4.9.0-202109302317.p0.git.0e0c173.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher-rhel8:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-attacher:v4.9.0-202109302317.p0.git.0a1737c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer-rhel8:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-resizer:v4.9.0-202109302317.p0.git.dad46d0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-external-snapshotter:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-controller:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.9.0-202109302317.p0.git.52ab893.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-deployer:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-builder:v4.9.0-202109302016.p0.git.50d5b91.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-docker-registry:v4.9.0-202109302317.p0.git.50d54ae.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-machine-controllers-rhel8:v4.9.0-202110011856.p0.git.d92b088.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.b1a29ea.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.9.0-202109302317.p0.git.48d49f7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-grafana:v4.9.0-202109302317.p0.git.6130ba8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-haproxy-router:v4.9.0-202109302317.p0.git.2d1e1f4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-hyperkube:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-insights-rhel8-operator:v4.9.0-202109302317.p0.git.51e4523.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-installer:v4.9.0-202110082228.p0.git.6e5b992.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.9.0-202109302016.p0.git.1d3d07b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-inspector-rhel8:v4.9.0-202109302016.p0.git.9474b75.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-ipa-downloader-rhel8:v4.9.0-202109302016.p0.git.6e9af39.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.9.0-202109302016.p0.git.a367c21.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-rhel8:v4.9.0-202110071025.p0.git.ab287f6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ironic-static-ip-manager-rhel8:v4.9.0-202109302016.p0.git.d13dccb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.9.0-202110011028.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-jenkins:v4.9.0-202109302317.p0.git.aa28a4b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-k8s-prometheus-adapter:v4.9.0-202109302317.p0.git.adfdd41.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-keepalived-ipfailover:v4.9.0-202109302317.p0.git.f93eca8.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-proxy:v4.9.0-202109302317.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-state-metrics:v4.9.0-202109302317.p0.git.6e41dbd.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kube-storage-version-migrator-rhel8:v4.9.0-202109302317.p0.git.901a6d2.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-cni-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-kuryr-controller-rhel8:v4.9.0-202109302016.p0.git.e66f211.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-libvirt-machine-controllers:v4.9.0-202109302317.p0.git.59ae2ed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-api-operator:v4.9.0-202109302317.p0.git.38efcc6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator:v4.9.0-202109302317.p0.git.d2d236b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-mdns-publisher-rhel8:v4.9.0-202109302317.p0.git.266597b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-admission-controller:v4.9.0-202109302317.p0.git.3c28a57.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni-alt-rhel8:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-cni:v4.9.0-202109302317.p0.git.5e081d5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-networkpolicy-rhel8:v4.9.0-202109302317.p0.git.fd12fed.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-alt-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-route-override-cni-rhel8:v4.9.0-202109302016.p0.git.707dd38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-alt-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.9.0-202109302016.p0.git.d291d96.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-must-gather:v4.9.0-202109302317.p0.git.d4b3f38.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-network-metrics-daemon-rhel8:v4.9.0-202109302317.p0.git.9fd6103.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-apiserver-rhel8:v4.9.0-202109302317.p0.git.6e0f921.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-proxy:v4.9.0-202109302016.p0.git.9ea1ebc.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-oauth-server-rhel8:v4.9.0-202109302317.p0.git.a51e181.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-apiserver-rhel8:v4.9.0-202109302317.p0.git.272f995.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-controller-manager-rhel8:v4.9.0-202109302317.p0.git.eda2db6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openshift-state-metrics-rhel8:v4.9.0-202109302317.p0.git.689af8b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.6f34668.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-cloud-controller-manager-rhel8:v4.9.0-202109302317.p0.git.ddbc0e4.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-openstack-machine-controllers:v4.9.0-202109302317.p0.git.a7442bb.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-lifecycle-manager:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-marketplace:v4.9.0-202109302317.p0.git.cfc16ec.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-operator-registry:v4.9.0-202109302317.p0.git.32eb259.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovirt-machine-controllers-rhel8:v4.9.0-202109302317.p0.git.2262c7c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes:v4.9.0-202110081859.p0.git.100ec23.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-pod:v4.9.0-202110080828.p0.git.894a78b.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prom-label-proxy:v4.9.0-202109302016.p0.git.4d11d13.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-alertmanager:v4.9.0-202109302016.p0.git.579e3c6.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-config-reloader:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-node-exporter:v4.9.0-202109302016.p0.git.1ab97f3.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus-operator:v4.9.0-202109302317.p0.git.ce7d979.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-prometheus:v4.9.0-202109302016.p0.git.3197fa7.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-sdn-rhel8:v4.9.0-202110041951.p0.git.9647cb0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-service-ca-operator:v4.9.0-202109302317.p0.git.ab44f58.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-telemeter:v4.9.0-202109302317.p0.git.03842e0.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tests:v4.9.0-202110011028.p0.git.6105395.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-thanos-rhel8:v4.9.0-202109302317.p0.git.e0fa82c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8:v4.9.0-202109302317.p0.git.96e95ce.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vmware-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-operator-rhel8:v4.9.0-202109302317.p0.git.09517b5.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-csi-driver-syncer-rhel8:v4.9.0-202109302317.p0.git.4ece3d1.assembly.stream", "8Base-RHOSE-4.9:openshift4/ose-vsphere-problem-detector-rhel8:v4.9.0-202109302317.p0.git.646689c.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8-operator:v4.9.0-202109302317.p0.git.7fe7f8e.assembly.stream", "8Base-RHOSE-4.9:openshift4/ovirt-csi-driver-rhel8:v4.9.0-202109302317.p0.git.22a3b88.assembly.stream" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" }, { "category": "external", "summary": "CVE-2021-34558", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "bz#1983596: CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" } ], "release_date": "2021-07-13T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ], "url": "https://access.redhat.com/errata/RHSA-2021:3759" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/ose-etcd:v4.9.0-202109302317.p0.git.5c1feaf.assembly.stream" ] } ], "threats": [ { "category": "impact", "date": "2021-07-14T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2022_0191
Vulnerability from csaf_redhat
Published
2022-01-19 17:48
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.9.2 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.9.2 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.9.2 images:
RHEL-8-CNV-4.9
==============
kubevirt-vmware-container-v4.9.2-1
virtio-win-container-v4.9.2-1
kubemacpool-container-v4.9.2-1
ovs-cni-plugin-container-v4.9.2-1
ovs-cni-marker-container-v4.9.2-1
node-maintenance-operator-container-v4.9.2-1
cnv-containernetworking-plugins-container-v4.9.2-1
hostpath-provisioner-container-v4.9.2-1
bridge-marker-container-v4.9.2-1
kubevirt-template-validator-container-v4.9.2-1
cluster-network-addons-operator-container-v4.9.2-1
kubernetes-nmstate-handler-container-v4.9.2-1
hostpath-provisioner-operator-container-v4.9.2-2
cnv-must-gather-container-v4.9.2-2
virt-cdi-controller-container-v4.9.2-8
virt-cdi-apiserver-container-v4.9.2-8
virt-cdi-uploadserver-container-v4.9.2-8
virt-cdi-operator-container-v4.9.2-8
virt-cdi-uploadproxy-container-v4.9.2-8
virt-cdi-cloner-container-v4.9.2-8
virt-cdi-importer-container-v4.9.2-8
hyperconverged-cluster-webhook-container-v4.9.2-6
hyperconverged-cluster-operator-container-v4.9.2-6
kubevirt-ssp-operator-container-v4.9.2-3
kubevirt-v2v-conversion-container-v4.9.2-2
vm-import-controller-container-v4.9.2-2
vm-import-operator-container-v4.9.2-2
vm-import-virtv2v-container-v4.9.2-2
virt-launcher-container-v4.9.2-7
virt-controller-container-v4.9.2-7
virt-api-container-v4.9.2-7
virt-operator-container-v4.9.2-7
virt-artifacts-server-container-v4.9.2-7
libguestfs-tools-container-v4.9.2-7
virt-handler-container-v4.9.2-7
hco-bundle-registry-container-v4.9.2-27
Security Fix(es):
* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)
* golang: net: lookup functions may return invalid host names (CVE-2021-33195)
* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.9.2 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.9.2 images:\n\nRHEL-8-CNV-4.9\n==============\nkubevirt-vmware-container-v4.9.2-1\nvirtio-win-container-v4.9.2-1\nkubemacpool-container-v4.9.2-1\novs-cni-plugin-container-v4.9.2-1\novs-cni-marker-container-v4.9.2-1\nnode-maintenance-operator-container-v4.9.2-1\ncnv-containernetworking-plugins-container-v4.9.2-1\nhostpath-provisioner-container-v4.9.2-1\nbridge-marker-container-v4.9.2-1\nkubevirt-template-validator-container-v4.9.2-1\ncluster-network-addons-operator-container-v4.9.2-1\nkubernetes-nmstate-handler-container-v4.9.2-1\nhostpath-provisioner-operator-container-v4.9.2-2\ncnv-must-gather-container-v4.9.2-2\nvirt-cdi-controller-container-v4.9.2-8\nvirt-cdi-apiserver-container-v4.9.2-8\nvirt-cdi-uploadserver-container-v4.9.2-8\nvirt-cdi-operator-container-v4.9.2-8\nvirt-cdi-uploadproxy-container-v4.9.2-8\nvirt-cdi-cloner-container-v4.9.2-8\nvirt-cdi-importer-container-v4.9.2-8\nhyperconverged-cluster-webhook-container-v4.9.2-6\nhyperconverged-cluster-operator-container-v4.9.2-6\nkubevirt-ssp-operator-container-v4.9.2-3\nkubevirt-v2v-conversion-container-v4.9.2-2\nvm-import-controller-container-v4.9.2-2\nvm-import-operator-container-v4.9.2-2\nvm-import-virtv2v-container-v4.9.2-2\nvirt-launcher-container-v4.9.2-7\nvirt-controller-container-v4.9.2-7\nvirt-api-container-v4.9.2-7\nvirt-operator-container-v4.9.2-7\nvirt-artifacts-server-container-v4.9.2-7\nlibguestfs-tools-container-v4.9.2-7\nvirt-handler-container-v4.9.2-7\nhco-bundle-registry-container-v4.9.2-27\n\nSecurity Fix(es):\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0191", "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1954505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954505" }, { "category": "external", "summary": "1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1992961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992961" }, { "category": "external", "summary": "1995824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995824" }, { "category": "external", "summary": "2015279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015279" }, { "category": "external", "summary": "2018468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018468" }, { "category": "external", "summary": "2022895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022895" }, { "category": "external", "summary": "2026198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026198" }, { "category": "external", "summary": "2028154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028154" }, { "category": "external", "summary": "2030198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030198" }, { "category": "external", "summary": "2032853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032853" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0191.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.9.2 Images security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:20:49+00:00", "generator": { "date": "2024-09-18T04:20:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2022:0191", "initial_release_date": "2022-01-19T17:48:00+00:00", "revision_history": [ { "date": "2022-01-19T17:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-19T17:48:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.9 for RHEL 8", "product": { "name": "CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.9::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.9.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.9.2-27" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.9.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.9.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.9.2-6" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.9.2-3" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.9.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "product_id": "container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.9.2-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.9.2-1" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.9.2-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.9.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.9.2-2" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.9.2-2" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "relates_to_product_reference": "8Base-CNV-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64 as a component of CNV 4.9 for RHEL 8", "product_id": "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64", "relates_to_product_reference": "8Base-CNV-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-31525", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1958341" } ], "notes": [ { "category": "description", "text": "A vulnerability was detected in net/http of the Go standard library when parsing very large HTTP header values, causing a crash and subsequent denial of service. This vulnerability affects both clients and servers written in Go, however, servers are only vulnerable if the value of MaxHeaderBytes has been increased from the default.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses net/http from the standard library. In OpenShift Container Platform (OCP), OpenShift Virtualization, OpenShift ServiceMesh (OSSM) and OpenShift distributed tracing (formerly OpenShift Jaeger), no server side component allows HTTP header values larger than 1 MB (the default), preventing this vulnerability from being exploited by malicious clients. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n* OpenShift Container Platform\n* OpenShift Virtualization \n* OpenShift ServiceMesh\n* OpenShift distributed tracing components.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31525" }, { "category": "external", "summary": "RHBZ#1958341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31525", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31525" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31525" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header" }, { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0191" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "known_not_affected": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-CNV-4.9:container-native-virtualization/bridge-marker@sha256:f860822b130abab11ae7885a645cc0e60b89e6264621e04303e73a6f58c22b16_amd64", "8Base-CNV-4.9:container-native-virtualization/cluster-network-addons-operator@sha256:762a7cc2936ba52085c72383932886994fc0b5c2d506bfcaa6e338427cbe77e9_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-containernetworking-plugins@sha256:627fb2b3af0136da38b914876f04ef209794bbbcde8237344610bcf0bf198483_amd64", "8Base-CNV-4.9:container-native-virtualization/cnv-must-gather-rhel8@sha256:4eca00751ce23c805078a48f2368850987869b9be900f6bc6afac1c33e6974dc_amd64", "8Base-CNV-4.9:container-native-virtualization/hco-bundle-registry@sha256:c5da47b16fb1dbfb9c346d3717f471475c6d8d8b7ea260b1aca9f5569d53f26a_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:07acd97516a7aff634df212ed83d764527e92250ed38e770a27dbc8ce20b0d93_amd64", "8Base-CNV-4.9:container-native-virtualization/hostpath-provisioner-rhel8@sha256:632c10fe92f88ea746e77d228139c78493eb7e2a9da6d8909d95994e72480363_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-operator@sha256:edfafde9b6141ac687edc10acb1406dad4b47de35a97377661a9f84e09eec44e_amd64", "8Base-CNV-4.9:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:51adcb63b1caadb271be8f1615d37f110abf0936a31098be7b94784accc84d1e_amd64", "8Base-CNV-4.9:container-native-virtualization/kubemacpool@sha256:1c1bb126ee278030833f97e21f7831cb2188ee57bf9f8cbb6bbc821fc8944c66_amd64", "8Base-CNV-4.9:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:d2e61e23ae391e789f26878f2ba5feb75623c38af0cc22777f87e13baa2a3d5b_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-ssp-operator@sha256:c4aeeab5efe48f05bcd50cca9b9a7e95bd7d4f91296923443bfd900b059924e2_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-template-validator@sha256:ecb2ff287bb14f664ddddf92e87e2d82a3f5dc97f329dd238983f6d1ddc05741_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-v2v-conversion@sha256:145dfb7fec058ac3b3f3124c2360a70132d6e806c5684c9bf6da762957976628_amd64", "8Base-CNV-4.9:container-native-virtualization/kubevirt-vmware@sha256:4a92fd0720bd9f7513b65464b04b584772e8b2e3e4bae2883b0e1b7446daf7a7_amd64", "8Base-CNV-4.9:container-native-virtualization/libguestfs-tools@sha256:c569004fbaffaebbba903320cf6d0da51c6102308a980d389410d83c1c355bac_amd64", "8Base-CNV-4.9:container-native-virtualization/node-maintenance-operator@sha256:4a04716d1c956d1d28b3da0e974dba1486a88c7d81f411f90942e70f690d98a7_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-marker@sha256:d03ef28a0cc7d83a3e985837126b621977a60c74b98512e46905ab11a5535a36_amd64", "8Base-CNV-4.9:container-native-virtualization/ovs-cni-plugin@sha256:4c7cb72c17bb3b6e2ef82ed77e72ab5c9161b3df7bf9d7dfbc70c48a85b28a86_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-api@sha256:6f95cee103dd998a8dcf6a2a6c88360ed87946ce5af3eb803340d5c1ae55d8e7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-artifacts-server@sha256:a5194b5d75b384c82c1e4f7f416c34e3f93b2832a6b5924ceea06101fa77a694_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-apiserver@sha256:d4e1d0b116ced42318d44314e1a0eaf51cadd9703942a35d6398c8d548a80dcd_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-cloner@sha256:da542791321880d5f09a6bb789df070d26f5328b71dcf955be332eb17ab82fc5_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-controller@sha256:b9656f356bcf5c5a7f2ad5efc72d05f944d5e1bcf173f2bbc1a9a71c12d6a100_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-operator@sha256:4101df51a3e10fe70465d8909253dd7d32fda719ec461ddc10c45b1f6d415f1c_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadproxy@sha256:b7fc7188e271e44cdf88ae6d580565c6759bf31ca36e99338aabcf165ad3805f_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-cdi-uploadserver@sha256:3514c2d7beaab63ef6f34c448f77a4aa648e8497978022e4a3401d63ed12599a_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-controller@sha256:7b51d7a4e3d37d752e79756aa66b9837c93d227d81f11e7b4783c6a4e35ac879_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-handler@sha256:028124044111d6e52d14d3bc611a113a1b5d61f850126bfc9c3f7ff518e6a4b7_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-launcher@sha256:85eca11b17c03b8d99333e7c0fe4e46e181807dd5c552cd0cf540d7b3411b142_amd64", "8Base-CNV-4.9:container-native-virtualization/virt-operator@sha256:d788a3a8ad2a7f856db92d04a0494faf17d5574038cd9cc6c067d96eb6851b46_amd64", "8Base-CNV-4.9:container-native-virtualization/virtio-win@sha256:bbeb74965b7fbc5423ebcda17d74c9cc6c516483203cc3b65bfce5e56afc0bc7_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-controller-rhel8@sha256:6d71a63d32aef72b316cdd88adc8b2c1feec45fc010fbfdb25f14c70ceb710e5_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-operator-rhel8@sha256:eaeb72ade36d20146b08d253ad486dbfac1bcf3ada352eded0158f88ede4be25_amd64", "8Base-CNV-4.9:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:a858f39514cabbfb121976ff37007cf8d5a26a547c126e12812a74cd781e8b42_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.9:container-native-virtualization/virt-cdi-importer@sha256:aea42e387b0feab73392cc22adade3fd0d53c7ff08a809dc5ceba7dad75a6215_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3229
Vulnerability from csaf_redhat
Published
2021-08-19 12:33
Modified
2024-09-18 04:20
Summary
Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update
Notes
Topic
An update is now available for Red Hat OpenShift Jaeger 1.20.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,
tailored for installation into an on-premise OpenShift Container Platform
installation.
Security Fix(es):
* golang: net: lookup functions may return invalid host names
(CVE-2021-33195)
* golang: archive/zip: Malformed archive may cause panic or memory
exhaustion (CVE-2021-33196)
* golang: net/http/httputil: ReverseProxy forwards connection headers if
first one is empty (CVE-2021-33197)
* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error
if passed inputs with very large exponents (CVE-2021-33198)
* golang: crypto/tls: certificate of wrong type is causing TLS client to
panic (CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Jaeger 1.20.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Jaeger is Red Hat\u0027s distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* golang: net: lookup functions may return invalid host names\n(CVE-2021-33195)\n\n* golang: archive/zip: Malformed archive may cause panic or memory\nexhaustion (CVE-2021-33196)\n\n* golang: net/http/httputil: ReverseProxy forwards connection headers if\nfirst one is empty (CVE-2021-33197)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error\nif passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to\npanic (CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3229", "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "TRACING-2083", "url": "https://issues.redhat.com/browse/TRACING-2083" }, { "category": "external", "summary": "TRACING-2087", "url": "https://issues.redhat.com/browse/TRACING-2087" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3229.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update", "tracking": { "current_release_date": "2024-09-18T04:20:00+00:00", "generator": { "date": "2024-09-18T04:20:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3229", "initial_release_date": "2021-08-19T12:33:40+00:00", "revision_history": [ { "date": "2021-08-19T12:33:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-19T12:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:20:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Jaeger 1.20", "product": { "name": "Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:jaeger:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Jaeger" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136?arch=ppc64le\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e?arch=s390x\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product_id": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-agent-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product_id": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-all-in-one-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product_id": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-collector-rhel8\u0026tag=1.20.5-5" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product_id": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-index-cleaner-rhel8\u0026tag=1.20.5-8" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product_id": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-es-rollover-rhel8\u0026tag=1.20.5-4" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product_id": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-ingester-rhel8\u0026tag=1.20.5-6" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product_id": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-query-rhel8\u0026tag=1.20.5-3" } } }, { "category": "product_version", "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product_id": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "product_identification_helper": { "purl": "pkg:oci/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f?arch=amd64\u0026repository_url=registry.redhat.io/distributed-tracing/jaeger-rhel8-operator\u0026tag=1.20.5-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le" }, "product_reference": "distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le" }, "product_reference": "distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le" }, "product_reference": "distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le" }, "product_reference": "distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" }, "product_reference": "distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le" }, "product_reference": "distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x" }, "product_reference": "distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64 as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "relates_to_product_reference": "8Base-JAEGER-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le as a component of Red Hat OpenShift Jaeger 1.20", "product_id": "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" }, "product_reference": "distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le", "relates_to_product_reference": "8Base-JAEGER-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33196", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-25T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform and OpenShift Service Mesh, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Plaform and OpenShift Service Mesh.\n\n* Although OpenShift distributed tracing (formerly OpenShift Jaeger) components are compiled with a vulnerable version of Go, the vulnerable archive/zip package is currently not used by this product therefore these components are affected but with impact Low. Additionally only core OpenShift distributed tracing components have been listed.\n\n* Although Serverless does ship the affected package, it does not make use of the actual package and hence the impact is low.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33196" }, { "category": "external", "summary": "RHBZ#1965503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33196" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33196" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "known_not_affected": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://docs.openshift.com/container-platform/4.8/jaeger/jaeger_install/rhbjaeger-updating.html", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:1601e98d05a3c596c6b165281d2221b9979d5d07ca6c3a5314db70c97fe3b1ed_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:4f057e83926ddffd190344754ff7722c0593d59ec083f4a36edab3cc78066319_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-index-cleaner-rhel8@sha256:5fde9fd6a7006f09a286d9453b97f61fe8d8d9c52ce15c81951e6e7242af9d04_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:1e28d2b8c9690eae2e724cdf640340d1327f60d6b2f9498053d089489d3bc0d9_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:6219e0a17e036b1056dda2a4eab694bbece960cde9b38984c12bbfb617d8f74a_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-es-rollover-rhel8@sha256:b3904f13916a5260bc05d336f475ea7d04cb27f94d036716406093dc9c4bc8de_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:3a3a04a589453a63a740c939c2246e09e92a2571c95b187b332dc6c08cd23894_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:a0b2d55420c0d807dfa80d7b5373f7f235cf0ad5edcc7075af0a549e7c179b01_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-agent-rhel8@sha256:afb97248879b0125fe657013c43db156d79f4e3b8096e432fe1445e2277e22d6_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:15ae661e4fca96e541514553fc80a40adfbe9bc174d04be529879d333a52341a_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:2888fe791e253b0996905494a87fe22d0a1244c80bb5915da81598f7ba494fe2_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-all-in-one-rhel8@sha256:f3fb0f3c7dd9f9b54a9d8c865027133da58e583d44d548fbe70017aa75e15d05_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:0c844f2c3806f4c45fa9ac2d33cf4feb211a65e4ebd0fe1faf40744633f7a88c_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:8e746d4997cd41c5051b86b5a6aea25789a04021257ca720b39ca607cbc0c0d7_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-collector-rhel8@sha256:f4b09dab750c8771f7691dcd7ba67e67ec959db0015a9f2e16056ac4064ef60a_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:45a12e906eccb6181bbe7ec79df4cd26241a78d2dbf6ef554b5e54072ba015dc_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:638c759beacd3ec5147c7d969d4adadac314b669ac7fab130e485fb050e30a07_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-ingester-rhel8@sha256:9a34b254114e0ce09732cff1958a99bd33d0bf2022011314ef44c09033df5c59_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:91e546e6dc677b1c8f1f2c47c42317ad607adcfccf7ad9a697f50bb1d4566b19_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:9245616fdd3f13177fd380e9ead380d36920fe1f8ff818109beb5a08437d355f_ppc64le", "8Base-JAEGER-1.20:distributed-tracing/jaeger-query-rhel8@sha256:db6b9a249117eb67f507970e2e0393cc31a12a13fcadd83556bdad5825d78950_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dc897bcc64f04d3b61eee46a1145f55c108384e91648621eb28c592e445e76e_s390x", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:2dfdc0fc7dc477b8f84403bbc639751fe7ad37521458b0a110add25c6b50a81f_amd64", "8Base-JAEGER-1.20:distributed-tracing/jaeger-rhel8-operator@sha256:a169e3ef17190613e28ffbdaf852a4eaf539b1ca62679ac030d08eb629cfd136_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
rhsa-2021_3009
Vulnerability from csaf_redhat
Published
2021-08-12 00:41
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.6.42 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.6.42 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.6.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.6.42. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHBA-2021:3008
Security Fix(es):
* net: lookup functions may return invalid host names(CVE-2021-33195)
* net/http/httputil: ReverseProxy forwards connection headers if first one
is empty (CVE-2021-33197)
* math/big.Rat: may cause a panic or an unrecoverable fatal error if passed
inputs with very large exponents (CVE-2021-33198)
* crypto/tls: certificate of wrong type is causing TLS client to
panic(CVE-2021-34558)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.6.42 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.6.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.6.42. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:3008\n\nSecurity Fix(es):\n\n* net: lookup functions may return invalid host names(CVE-2021-33195)\n\n* net/http/httputil: ReverseProxy forwards connection headers if first one\nis empty (CVE-2021-33197)\n\n* math/big.Rat: may cause a panic or an unrecoverable fatal error if passed\ninputs with very large exponents (CVE-2021-33198)\n\n* crypto/tls: certificate of wrong type is causing TLS client to\npanic(CVE-2021-34558)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3009", "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "1989867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989867" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_3009.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.6.42 security update", "tracking": { "current_release_date": "2024-09-18T04:19:47+00:00", "generator": { "date": "2024-09-18T04:19:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:3009", "initial_release_date": "2021-08-12T00:41:41+00:00", "revision_history": [ { "date": "2021-08-12T00:41:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-08-12T00:41:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el7" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.6", "product": { "name": "Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.6::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "product": { "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "product_id": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202107292126.p0.git.4c3480d.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "product": { "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "product_id": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202107292126.p0.git.4ec6967.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el7?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "product": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "product_id": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-8.rhaos4.6.git947598e.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "product": { "name": "openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "product_id": "openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.6.0-202107300032.p0.git.0063daa.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "product": { "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "product_id": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.6.0-202107292126.p0.git.4c3480d.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el8?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "product_id": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202107291238.p0.git.39cfc66.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202107292126.p0.git.4c3480d.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202107292126.p0.git.2b525e8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-8.rhaos4.6.git0fa2911.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-8.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-8.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-8.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "product_id": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202107292126.p0.git.4c3480d.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.6.0-202107292126.p0.git.2b525e8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202107291238.p0.git.39cfc66.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_id": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product": { "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product_id": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.6.0-202107292126.p0.git.4ec6967.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product_id": "openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.6.0-202107292126.p0.git.4ec6967.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.6.0-202107300032.p0.git.0063daa.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_id": "openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.6.0-202107300032.p0.git.0063daa.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.6.0-202107300032.p0.git.0063daa.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.6.0-202107300032.p0.git.0063daa.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-8.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-8.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-8.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202107292126.p0.git.4c3480d.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202107291238.p0.git.39cfc66.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.6.0-8.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.6.0-8.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.6.0-8.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.6.0-8.rhaos4.6.git947598e.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "product_id": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.6.0-202107292126.p0.git.4c3480d.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "product": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "product_id": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.6.0-202107292126.p0.git.2b525e8.el8?arch=s390x" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.6.0-202107291238.p0.git.39cfc66.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_id": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_id": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_id": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.19.3-8.rhaos4.6.git0fa2911.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src" }, "product_reference": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch" }, "product_reference": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src" }, "product_reference": "openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64" }, "product_reference": "cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src" }, "product_reference": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src" }, "product_reference": "openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64" }, "product_reference": "openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src" }, "product_reference": "openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch as a component of Red Hat OpenShift Container Platform 4.6", "product_id": "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-33195", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989564" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go. The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions in the net package and methods on the Resolver type, may return arbitrary values retrieved from DNS, allowing injection of unexpected contents. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: lookup functions may return invalid host names", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33195" }, { "category": "external", "summary": "RHBZ#1989564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33195" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3009" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: lookup functions may return invalid host names" }, { "cve": "CVE-2021-33197", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989570" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, acting as an unintended proxy or intermediary, where ReverseProxy forwards connection headers if the first one was empty. This flaw allows an attacker to drop arbitrary headers. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* For Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the golang-qpid-apache package.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33197" }, { "category": "external", "summary": "RHBZ#1989570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3009" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty" }, { "cve": "CVE-2021-33198", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989575" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents", "title": "Vulnerability summary" }, { "category": "other", "text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33198" }, { "category": "external", "summary": "RHBZ#1989575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" } ], "release_date": "2021-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3009" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents" }, { "cve": "CVE-2021-34558", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1983596" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic", "title": "Vulnerability summary" }, { "category": "other", "text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34558" }, { "category": "external", "summary": "RHBZ#1983596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.15.minor", "url": "https://golang.org/doc/devel/release#go1.15.minor" }, { "category": "external", "summary": "https://golang.org/doc/devel/release#go1.16.minor", "url": "https://golang.org/doc/devel/release#go1.16.minor" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.src", "7Server-RH7-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-ansible-0:4.6.0-202107292126.p0.git.4ec6967.el7.src", "7Server-RH7-RHOSE-4.6:openshift-ansible-test-0:4.6.0-202107292126.p0.git.4ec6967.el7.noarch", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.src", "7Server-RH7-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el7.x86_64", "7Server-RH7-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el7.x86_64", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.ppc64le", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.s390x", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.src", "8Base-RHOSE-4.6:atomic-openshift-service-idler-0:4.6.0-202107291238.p0.git.39cfc66.el8.x86_64", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.src", "8Base-RHOSE-4.6:cri-o-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debuginfo-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.ppc64le", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.s390x", "8Base-RHOSE-4.6:cri-o-debugsource-0:1.19.3-8.rhaos4.6.git0fa2911.el8.x86_64", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:openshift-0:4.6.0-202107292126.p0.git.4c3480d.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.ppc64le", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.s390x", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.src", "8Base-RHOSE-4.6:openshift-clients-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-clients-redistributable-0:4.6.0-202107292126.p0.git.2b525e8.el8.x86_64", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.ppc64le", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.s390x", "8Base-RHOSE-4.6:openshift-hyperkube-0:4.6.0-202107292126.p0.git.4c3480d.el8.x86_64", "8Base-RHOSE-4.6:openshift-kuryr-0:4.6.0-202107300032.p0.git.0063daa.el8.src", "8Base-RHOSE-4.6:openshift-kuryr-cni-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-common-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:openshift-kuryr-controller-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch", "8Base-RHOSE-4.6:python3-kuryr-kubernetes-0:4.6.0-202107300032.p0.git.0063daa.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.src", "8Base-RHOSE-4.6:ignition-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-debugsource-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.ppc64le", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.s390x", "8Base-RHOSE-4.6:ignition-validate-debuginfo-0:2.6.0-8.rhaos4.6.git947598e.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic" } ] }
ghsa-wqr7-cf9q-rvf7
Vulnerability from github
Published
2022-05-24 19:09
Modified
2022-08-05 00:00
Severity
Details
Go before 1.15.12 and 1.16.x before 1.16.5 acts as an Unintended Proxy or Intermediary.
{ "affected": [], "aliases": [ "CVE-2021-33197" ], "database_specific": { "cwe_ids": [ "CWE-862" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-02T19:15:00Z", "severity": "MODERATE" }, "details": "Go before 1.15.12 and 1.16.x before 1.16.5 acts as an Unintended Proxy or Intermediary.", "id": "GHSA-wqr7-cf9q-rvf7", "modified": "2022-08-05T00:00:27Z", "published": "2022-05-24T19:09:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33197" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-0941
Vulnerability from csaf_certbund
Published
2021-08-09 22:00
Modified
2024-05-21 22:00
Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um die Integrität und die Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um die Integrit\u00e4t und die Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0941 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0941.json" }, { "category": "self", "summary": "WID-SEC-2022-0941 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0941" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3759 vom 2021-10-18", "url": "https://access.redhat.com/errata/RHSA-2021:3759" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3820 vom 2021-10-19", "url": "https://access.redhat.com/errata/RHSA-2021:3820" }, { "category": "external", "summary": "RedHat Security Advisory RHSA-2021:2984 vom 2021-08-09", "url": "https://access.redhat.com/errata/RHSA-2021:2984" }, { "category": "external", "summary": "RedHat Security Advisory RHSA-2021:2983 vom 2021-08-10", "url": "https://access.redhat.com/errata/RHSA-2021:2983" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4156 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4156" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4226 vom 2021-11-09", "url": "https://access.redhat.com/errata/RHSA-2021:4226" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3009 vom 2021-08-12", "url": "https://access.redhat.com/errata/RHSA-2021:3009" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3146 vom 2021-08-12", "url": "https://access.redhat.com/errata/RHSA-2021:3146" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3229 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3229" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3361" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3248 vom 2021-08-31", "url": "https://access.redhat.com/errata/RHSA-2021:3248" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3431 vom 2021-09-07", "url": "https://access.redhat.com/errata/RHSA-2021:3431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3454 vom 2021-09-08", "url": "https://access.redhat.com/errata/RHSA-2021:3454" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3487 vom 2021-09-15", "url": "https://access.redhat.com/errata/RHSA-2021:3487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17", "url": "https://access.redhat.com/errata/RHSA-2021:3556" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3555 vom 2021-09-16", "url": "https://access.redhat.com/errata/RHSA-2021:3555" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3598 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3598" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3585 vom 2021-09-21", "url": "https://access.redhat.com/errata/RHSA-2021:3585" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-3585 vom 2021-09-22", "url": "http://linux.oracle.com/errata/ELSA-2021-3585.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4104 vom 2021-11-02", "url": "https://access.redhat.com/errata/RHSA-2021:4104" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4725 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4725" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4722 vom 2021-11-17", "url": "https://access.redhat.com/errata/RHSA-2021:4722" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4902 vom 2021-12-01", "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4914 vom 2021-12-02", "url": "https://access.redhat.com/errata/RHSA-2021:4914" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4910 vom 2021-12-02", "url": "https://access.redhat.com/errata/RHSA-2021:4910" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5072 vom 2021-12-10", "url": "https://access.redhat.com/errata/RHSA-2021:5072" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5086 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5086" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5085 vom 2021-12-13", "url": "https://access.redhat.com/errata/RHSA-2021:5085" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0191 vom 2022-01-20", "url": "https://access.redhat.com/errata/RHSA-2022:0191" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0237 vom 2022-01-24", "url": "https://access.redhat.com/errata/RHSA-2022:0237" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0260 vom 2022-01-25", "url": "https://access.redhat.com/errata/RHSA-2022:0260" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0432 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0431 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0557 vom 2022-02-23", "url": "https://access.redhat.com/errata/RHSA-2022:0557" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0561 vom 2022-02-23", "url": "https://access.redhat.com/errata/RHSA-2022:0561" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0947 vom 2022-03-16", "url": "https://access.redhat.com/errata/RHSA-2022:0947" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0997 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0997" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0998 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0989 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0989" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0988 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:0988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0577 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1276 vom 2022-04-08", "url": "https://access.redhat.com/errata/RHSA-2022:1276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1329 vom 2022-04-12", "url": "https://access.redhat.com/errata/RHSA-2022:1329" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1372 vom 2022-04-14", "url": "https://access.redhat.com/errata/RHSA-2022:1372" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1402 vom 2022-04-19", "url": "https://access.redhat.com/errata/RHSA-2022:1402" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1830 vom 2022-08-08", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1830.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202208-02 vom 2022-08-09", "url": "https://security.gentoo.org/glsa/202208-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7954 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7954" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7955 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7955" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8008 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8008" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7955 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-7955.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2586 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2586" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2988" } ], "source_lang": "en-US", "title": "Red Hat OpenShift: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:10:52.845+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0941", "initial_release_date": "2021-08-09T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-09T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-08-10T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-30T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-31T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-06T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-14T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-16T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-09-22T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-18T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-10-19T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-02T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-09T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-17T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-01T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-02T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-09T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-12-13T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-19T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-24T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-25T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-23T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-16T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-23T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-07T22:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-12T22:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-13T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-19T22:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-23T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-01T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c4.8.4", "product": { "name": "Red Hat OpenShift \u003c4.8.4", "product_id": "T020080", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.8.4" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "In Red Hat OpenShift existieren mehrere Schwachstellen in der Komponente \"Golang\". Diese Schwachstellen sind auf Fehler bei der Eingabevalidierung zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Verf\u00fcgbarkeit und die Integrit\u00e4t zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "67646", "398363", "T012167", "T004914" ] }, "release_date": "2021-08-09T22:00:00Z", "title": "CVE-2021-33198" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
gsd-2021-33197
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-33197", "description": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.", "id": "GSD-2021-33197", "references": [ "https://www.suse.com/security/cve/CVE-2021-33197.html", "https://access.redhat.com/errata/RHSA-2022:0191", "https://access.redhat.com/errata/RHSA-2021:5086", "https://access.redhat.com/errata/RHSA-2021:5085", "https://access.redhat.com/errata/RHSA-2021:5072", "https://access.redhat.com/errata/RHSA-2021:4226", "https://access.redhat.com/errata/RHSA-2021:4156", "https://access.redhat.com/errata/RHSA-2021:4104", "https://access.redhat.com/errata/RHSA-2021:3820", "https://access.redhat.com/errata/RHSA-2021:3759", "https://access.redhat.com/errata/RHSA-2021:3598", "https://access.redhat.com/errata/RHSA-2021:3556", "https://access.redhat.com/errata/RHSA-2021:3555", "https://access.redhat.com/errata/RHSA-2021:3487", "https://access.redhat.com/errata/RHSA-2021:3431", "https://access.redhat.com/errata/RHSA-2021:3361", "https://access.redhat.com/errata/RHSA-2021:3248", "https://access.redhat.com/errata/RHSA-2021:3229", "https://access.redhat.com/errata/RHSA-2021:3146", "https://access.redhat.com/errata/RHSA-2021:3009", "https://access.redhat.com/errata/RHSA-2021:2984", "https://access.redhat.com/errata/RHSA-2021:2983", "https://access.redhat.com/errata/RHBA-2021:2979", "https://advisories.mageia.org/CVE-2021-33197.html", "https://security.archlinux.org/CVE-2021-33197", "https://access.redhat.com/errata/RHSA-2022:0577", "https://access.redhat.com/errata/RHSA-2022:0947", "https://access.redhat.com/errata/RHSA-2022:1329", "https://access.redhat.com/errata/RHSA-2022:1402", "https://alas.aws.amazon.com/cve/html/CVE-2021-33197.html", "https://linux.oracle.com/cve/CVE-2021-33197.html", "https://access.redhat.com/errata/RHSA-2022:7954", "https://access.redhat.com/errata/RHSA-2022:8008" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-33197" ], "details": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.", "id": "GSD-2021-33197", "modified": "2023-12-13T01:23:18.988824Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.5", "versionStartIncluding": "1.16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.15.13", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33197" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-862" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2022-09-14T21:11Z", "publishedDate": "2021-08-02T19:15Z" } } }
Loading...