Action not permitted
Modal body text goes here.
CVE-2021-3712
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T17:01:08.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "tags": [ "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "name": "DSA-4963", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "tags": [ "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "tags": [ "x_transferred" ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "name": "GLSA-202209-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)" }, { "status": "affected", "version": "Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y)" } ] } ], "credits": [ { "lang": "en", "value": "Ingo Schwarze" } ], "datePublic": "2021-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y)." } ], "metrics": [ { "other": { "content": { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", "value": "Moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-21T19:07:21.902973", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "name": "DSA-4963", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "url": "https://www.tenable.com/security/tns-2021-16" }, { "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366" }, { "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "url": "https://www.tenable.com/security/tns-2022-02" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "name": "GLSA-202209-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "Read buffer overruns processing ASN.1 strings" } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2021-3712", "datePublished": "2021-08-24T14:50:14.704334Z", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-09-16T20:32:42.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3712\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2021-08-24T15:15:09.533\",\"lastModified\":\"2024-06-21T19:15:20.433\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \\\"d2i\\\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \\\"data\\\" and \\\"length\\\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \\\"data\\\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).\"},{\"lang\":\"es\",\"value\":\"Las cadenas ASN.1 se representan internamente en OpenSSL como una estructura ASN1_STRING que contiene un b\u00fafer que contiene los datos de la cadena y un campo que contiene la longitud del b\u00fafer. Esto contrasta con las cadenas C normales, que se representan como un b\u00fafer para los datos de la cadena que termina con un byte NUL (0). Aunque no es un requisito estricto, las cadenas ASN.1 que se analizan usando las propias funciones \\\"d2i\\\" de OpenSSL (y otras funciones de an\u00e1lisis similares), as\u00ed como cualquier cadena cuyo valor ha sido ajustado con la funci\u00f3n ASN1_STRING_set(), terminar\u00e1n adicionalmente con NUL la matriz de bytes en la estructura ASN1_STRING. Sin embargo, es posible que las aplicaciones construyan directamente estructuras ASN1_STRING v\u00e1lidas que no terminen en NUL la matriz de bytes, ajustando directamente los campos \\\"data\\\" y \\\"length\\\" en la matriz ASN1_STRING. Esto tambi\u00e9n puede ocurrir usando la funci\u00f3n ASN1_STRING_set0(). Se ha detectado que numerosas funciones de OpenSSL que imprimen datos ASN.1 asumen que la matriz de bytes ASN1_STRING estar\u00e1 terminada en NUL, aunque esto no est\u00e1 garantizado para las cadenas que han sido construidas directamente. Cuando una aplicaci\u00f3n pide que se imprima una estructura ASN.1, y cuando esa estructura ASN.1 contiene ASN1_STRINGs que han sido construidos directamente por la aplicaci\u00f3n sin terminar en NUL el campo \\\"data\\\", entonces puede ocurrir un desbordamiento del buffer de lectura. Lo mismo puede ocurrir durante el procesamiento de las restricciones de nombre de los certificados (por ejemplo, si un certificado ha sido construido directamente por la aplicaci\u00f3n en lugar de cargarlo por medio de las funciones de an\u00e1lisis de OpenSSL, y el certificado contiene estructuras ASN1_STRING sin terminaci\u00f3n NUL). Tambi\u00e9n puede ocurrir en las funciones X509_get1_email(), X509_REQ_get1_email() y X509_get1_ocsp(). Si un actor malicioso puede hacer que una aplicaci\u00f3n construya directamente un ASN1_STRING y luego lo procese a mediante una de las funciones de OpenSSL afectadas, este problema podr\u00eda ser alcanzado. Esto podr\u00eda resultar en un bloqueo (causando un ataque de Denegaci\u00f3n de Servicio). Tambi\u00e9n podr\u00eda resultar en la revelaci\u00f3n de contenidos de memoria privada (como claves privadas, o texto plano confidencial). Corregido en OpenSSL versi\u00f3n 1.1.1l (Afectada 1.1.1-1.1.1k). Corregido en OpenSSL versi\u00f3n 1.0.2za (Afectada 1.0.2-1.0.2y).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndExcluding\":\"1.0.2za\",\"matchCriteriaId\":\"20353A2F-46B5-4C46-B562-42CD6E2B248B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.1\",\"versionEndExcluding\":\"1.1.1l\",\"matchCriteriaId\":\"A9592A08-7FF0-490F-B684-6EA8E49F36C7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62347994-1353-497C-9C4A-D5D8D95F67E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.50.2\",\"matchCriteriaId\":\"433D435D-13D0-4EAA-ACD9-DD88DA712D00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39DCAE7-494F-40B2-867F-6C6A077939DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361B791A-D336-4431-8F68-8135BEFFAEA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_encryption:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D82795C-F1ED-4D2C-B578-75B9EECBB99C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.10.0\",\"matchCriteriaId\":\"A30F7908-5AF6-4761-BC6A-4C18EFAE48E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F30D3AF-4FA3-4B7A-BE04-C24E2EA19A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B00DDE7-7002-45BE-8EDE-65D964922CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB88C165-BB24-49FB-AAF6-087A766D5AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF806B52-DAD5-4D12-8BB6-3CBF9DC6B8DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DE847E0-431D-497D-9C57-C4E59749F6A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"46385384-5561-40AA-9FDE-A2DE4FDFAD3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7CA7CA6-7CF2-48F6-81B5-69BA0A37EF4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E5481-1070-4E1F-8679-1985DE4E785A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9EEA681-67FF-43B3-8610-0FA17FD279E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C33BA8EA-793D-4E79-BE9C-235ACE717216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"823DBE80-CB8D-4981-AE7C-28F3FDD40451\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.0.0\",\"matchCriteriaId\":\"9E0DE4DE-9454-4E8D-9E00-3CBCDD8C142A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16.0\",\"versionEndIncluding\":\"5.19.1\",\"matchCriteriaId\":\"8D977244-DC29-4301-8D89-0BD01BC328B8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.1.2.4.047\",\"matchCriteriaId\":\"6A0BD5BD-E2F8-4B4E-B5CF-9787E6F2E4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.0\",\"versionEndExcluding\":\"21.3\",\"matchCriteriaId\":\"3197F464-F0A5-4BD4-9068-65CD448D8F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DD67FD-CE98-4556-A036-B2970935AF4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.27\",\"matchCriteriaId\":\"AE23C7E1-F849-411D-850F-A504D4BA3414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.25\",\"matchCriteriaId\":\"88627B99-16DC-4878-A63A-A40F6FC1F477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7.0\",\"versionEndIncluding\":\"5.7.35\",\"matchCriteriaId\":\"E667933A-37EA-4BC2-9180-C3B4B7038866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.26\",\"matchCriteriaId\":\"709E83B4-8C66-4255-870B-2F72B37BA8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.0.26\",\"matchCriteriaId\":\"EED6C8C2-F986-4CFD-A343-AD2340F850F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E416B-920B-49A0-9523-382898C2979D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8929B61-16EC-4FE0-98A5-1CC7CC7FD9CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E503FB-6279-4D4A-91D8-E237ECF9D2B0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.1.1\",\"matchCriteriaId\":\"B0F46497-4AB0-49A7-9453-CC26837BF253\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAB7154-4DE8-4806-86D0-C1D33B84417B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4349FE-EEF8-489A-8ABF-5FCD55EC6DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EAA723-2A23-4151-930B-86ACF9CC1C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C416FD3-2E2F-4BBC-BD5F-F896825883F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D886339E-EDB2-4879-BD54-1800E4CA9CAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB468FEE-A0F4-49A0-BBEE-10D0733C87D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5C177E-0C77-48C9-847A-A9E5AA7DBC1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348EEE70-E114-4720-AAAF-E77DE5C9A2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCDD73B-57B1-4580-B922-5662E3AC13B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015A8CB-8FA6-423E-8307-BD903244F517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A4E206-56C7-4578-AC9C-088B0C8D9CFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:health_sciences_inform_publisher:6.2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D1E6A38-4CBD-42E9-B2D2-11AEF157822F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:health_sciences_inform_publisher:6.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D105A5B-0AA8-4782-B804-CB1384F85884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.2.6.3\",\"matchCriteriaId\":\"BE34D4F7-5C18-4578-8D0A-722FDF931333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1CAD50-749F-4ADB-A046-BF3585677A58\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/08/26/2\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202209-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202210-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210827-0010/\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"openssl-security@openssl.org\"},{\"url\":\"https://www.debian.org/security/2021/dsa-4963\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20210824.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2022.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2021-16\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2022-02\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_4614
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, fix several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 10 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)\n* httpd: mod_session NULL pointer dereference in parser (CVE-2021-26690)\n* httpd: Heap overflow in mod_session (CVE-2021-26691)\n* httpd: mod_proxy_wstunnel tunneling of non Upgraded connection (CVE-2019-17567)\n* httpd: MergeSlashes regression (CVE-2021-30641)\n* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)\n* jbcs-httpd24-openssl: openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n* pcre: buffer over-read in JIT when UTF is disabled (CVE-2019-20838)\n* pcre: integer overflow in libpcre (CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4614", "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1848436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436" }, { "category": "external", "summary": "1848444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444" }, { "category": "external", "summary": "1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "1966724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724" }, { "category": "external", "summary": "1966729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729" }, { "category": "external", "summary": "1966732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732" }, { "category": "external", "summary": "1966738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738" }, { "category": "external", "summary": "1966740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740" }, { "category": "external", "summary": "1966743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4614.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update", "tracking": { "current_release_date": "2024-11-15T11:58:48+00:00", "generator": { "date": "2024-11-15T11:58:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4614", "initial_release_date": "2021-11-10T17:20:46+00:00", "revision_history": [ { "date": "2021-11-10T17:20:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-10T17:20:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:58:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 8", "product": { "name": "Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-20.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "product_id": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "product_id": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.el8jbcs?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.48-20.redhat_1.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.el8jbcs?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.el8jbcs?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-107.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-107.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-84.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-39.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-39.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-8.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-7.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-22.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-78.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-78.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-78.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-21.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-40.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-9.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-67.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.48-20.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-107.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-107.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-107.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite-debuginfo@1.6.1-84.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl@7.78.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl@7.78.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-devel@7.78.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-curl-debuginfo@7.78.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-libcurl-debuginfo@7.78.0-2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.39.2-39.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.39.2-39.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.39.2-39.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs-debuginfo@1.1.1g-8.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil@1.0.0-7.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-chil-debuginfo@1.0.0-7.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11@0.4.10-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "product_id": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-pkcs11-debuginfo@0.4.10-22.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools-debuginfo@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap-debuginfo@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html-debuginfo@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session-debuginfo@2.4.37-78.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl-debuginfo@2.4.37-78.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2@1.15.7-21.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_http2-debuginfo@1.15.7-21.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md@2.0.8-40.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_md-debuginfo@2.0.8-40.el8jbcs?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.48-20.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.48-20.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24-debuginfo@1.2.48-20.redhat_1.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.16-9.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.16-9.Final_redhat_2.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.2-67.GA.el8jbcs?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.2-67.GA.el8jbcs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-78.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.37-78.el8jbcs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64 as a component of Red Hat JBoss Core Services on RHEL 8", "product_id": "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64", "relates_to_product_reference": "8Base-JBCS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Apache project", "Mikhail Egorov" ] } ], "cve": "CVE-2019-17567", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966740" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17567" }, { "category": "external", "summary": "RHBZ#1966740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17567", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Only configurations which use mod_proxy_wstunnel are affected by this flaw. It is also safe to comment-out the \"LoadModule proxy_wstunnel_module ... \" line in /etc/httpd/conf.modules.d/00-proxy.conf for configurations which do not rely on a websockets reverse proxy.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection" }, { "cve": "CVE-2019-20838", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848444" } ], "notes": [ { "category": "description", "text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20838" }, { "category": "external", "summary": "RHBZ#1848444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Do not use more than one fixed quantifier with \\R or \\X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1" }, { "acknowledgments": [ { "names": [ "the Apache project", "Marc Stern" ] } ], "cve": "CVE-2020-13950", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966738" } ], "notes": [ { "category": "description", "text": "A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13950" }, { "category": "external", "summary": "RHBZ#1966738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13950", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy NULL pointer dereference" }, { "cve": "CVE-2020-14155", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848436" } ], "notes": [ { "category": "description", "text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Integer overflow when parsing callout numeric arguments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14155" }, { "category": "external", "summary": "RHBZ#1848436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14155", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "This flaw can be mitigated by not compiling regular expressions with a callout value greater outside of 0-255 or handling the value passed to the callback within the application code.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: Integer overflow when parsing callout numeric arguments" }, { "acknowledgments": [ { "names": [ "the Apache project" ] }, { "names": [ "Antonio Morales" ], "organization": "GHSL" } ], "cve": "CVE-2020-35452", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966724" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Single zero byte stack overflow in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a one byte overflow and as per upstream it should be non-exploitable in most condtions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35452" }, { "category": "external", "summary": "RHBZ#1966724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35452", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Only configurations which use mod_auth_digest are affected by this flaw. Also as per upstream this flaw is not exploitable in most conditions, so there should really be no impact of this flaw.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Single zero byte stack overflow in mod_auth_digest" }, { "cve": "CVE-2021-3688", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990252" } ], "notes": [ { "category": "description", "text": "A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3688" }, { "category": "external", "summary": "RHBZ#1990252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3688", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3688" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Manually add LocationMatch directive to deny any possible problem requests in the JBCS httpd configuration. For example:\n~~~\n\u003cLocationMatch \".*\\.\\.;.*\"\u003e\n Require all denied\n\u003c/LocationMatch\u003e\n~~~", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930324" } ], "notes": [ { "category": "description", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: integer overflow in CipherUpdate", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "RHBZ#1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: integer overflow in CipherUpdate" }, { "cve": "CVE-2021-23841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930310" } ], "notes": [ { "category": "description", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "RHBZ#1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()" }, { "acknowledgments": [ { "names": [ "the Apache project" ] }, { "names": [ "Antonio Morales" ], "organization": "GHSL" } ], "cve": "CVE-2021-26690", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966729" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session: NULL pointer dereference when parsing Cookie header", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a null pointer deference caused when using mod_session. It can result in crash of httpd child process by a remote attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26690" }, { "category": "external", "summary": "RHBZ#1966729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session: NULL pointer dereference when parsing Cookie header" }, { "acknowledgments": [ { "names": [ "the Apache project", "Christophe Jaillet" ] } ], "cve": "CVE-2021-26691", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966732" } ], "notes": [ { "category": "description", "text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can result in a crash of the httpd child process when mod_session is used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26691" }, { "category": "external", "summary": "RHBZ#1966732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value" }, { "acknowledgments": [ { "names": [ "the Apache project", "Christoph Anton Mitterer" ] } ], "cve": "CVE-2021-30641", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966743" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was introduced when fixing https://access.redhat.com/security/cve/cve-2019-0220, therefore versions of httpd package shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Software Collections are affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30641" }, { "category": "external", "summary": "RHBZ#1966743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "This issue can be mitigated by setting the \"MergeSlashes\" directive to OFF", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027" }, { "cve": "CVE-2021-34798", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005128" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference via malformed requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34798" }, { "category": "external", "summary": "RHBZ#2005128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34798", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:20:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-curl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.jbcs.el7.x86_64", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-107.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-apr-util-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-ldap-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-mysql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-nss-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-odbc-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-openssl-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-pgsql-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-apr-util-sqlite-debuginfo-0:1.6.1-84.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-curl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-curl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-httpd-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-devel-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-manual-0:2.4.37-78.el8jbcs.noarch", "8Base-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-httpd-tools-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-debuginfo-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-libcurl-devel-0:7.78.0-2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.16-9.Final_redhat_2.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_http2-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_http2-debuginfo-0:1.15.7-21.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-0:1.2.48-20.redhat_1.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-ap24-debuginfo-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.48-20.redhat_1.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ldap-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_md-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_md-debuginfo-1:2.0.8-40.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_proxy_html-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-mod_security-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.2-67.GA.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_session-debuginfo-0:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-mod_ssl-debuginfo-1:2.4.37-78.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-nghttp2-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-nghttp2-devel-0:1.39.2-39.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-chil-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-chil-debuginfo-0:1.0.0-7.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-devel-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-libs-debuginfo-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-perl-1:1.1.1g-8.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.src", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-pkcs11-debuginfo-0:0.4.10-22.el8jbcs.x86_64", "8Base-JBCS:jbcs-httpd24-openssl-static-1:1.1.1g-8.el8jbcs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: NULL pointer dereference via malformed requests" } ] }
rhsa-2021_4861
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340)\n* tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037)\n* tomcat: JNDI realm authentication weakness (CVE-2021-30640)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4861", "url": "https://access.redhat.com/errata/RHSA-2021:4861" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4861.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release", "tracking": { "current_release_date": "2024-11-15T11:59:54+00:00", "generator": { "date": "2024-11-15T11:59:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4861", "initial_release_date": "2021-11-30T14:28:36+00:00", "revision_history": [ { "date": "2021-11-30T14:28:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-30T14:28:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:59:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 5.6 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "product": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "product": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "product": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "product": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "product": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "product": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk11@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-java-jdk8@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product": { "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product_id": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el7jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-admin-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-docs-webapp@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-el-3.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-javadoc@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-jsp-2.3-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-lib@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-selinux@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-servlet-4.0-api@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-webapps@9.0.50-3.redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product": { "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product_id": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-vault-javadoc@1.1.8-4.Final_redhat_00004.1.el8jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "product": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el7jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el7jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "product": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "product_id": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native@1.2.30-3.redhat_3.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "product": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "product_id": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws5-tomcat-native-debuginfo@1.2.30-3.redhat_3.el8jws?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src" }, "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src" }, "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64" }, "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src" }, "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 7 Server", "product_id": "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "relates_to_product_reference": "7Server-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src" }, "product_reference": "jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src" }, "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64" }, "product_reference": "jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64 as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64" }, "product_reference": "jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src" }, "product_reference": "jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" }, { "category": "default_component_of", "full_product_name": { "name": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch as a component of Red Hat JBoss Web Server 5.6 for RHEL 8", "product_id": "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" }, "product_reference": "jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-5.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930324" } ], "notes": [ { "category": "description", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: integer overflow in CipherUpdate", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "RHBZ#1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: integer overflow in CipherUpdate" }, { "cve": "CVE-2021-23841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930310" } ], "notes": [ { "category": "description", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "RHBZ#1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" }, { "category": "workaround", "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()" }, { "cve": "CVE-2021-30640", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981544" } ], "notes": [ { "category": "description", "text": "A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: JNDI realm authentication weakness", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30640" }, { "category": "external", "summary": "RHBZ#1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30640", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: JNDI realm authentication weakness" }, { "cve": "CVE-2021-33037", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981533" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP request smuggling when used with a reverse proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33037" }, { "category": "external", "summary": "RHBZ#1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33037", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33037" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP request smuggling when used with a reverse proxy" }, { "cve": "CVE-2021-42340", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2014356" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Apache Tomcat, where an HTTP upgrade connection does not release for WebSocket connections once the WebSocket connection is closed. If a sufficient number of such requests are made, an OutOfMemoryError occurs, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenStack Platform, Tomcat is provided as a component of OpenDaylight. This flaw will not receive a fix as OpenDaylight was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.\n\nRed Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42340" }, { "category": "external", "summary": "RHBZ#2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E", "url": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:28:36+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4861" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk11-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-java-jdk8-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el7jws.x86_64", "7Server-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el7jws.src", "7Server-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el7jws.noarch", "7Server-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el7jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-0:9.0.50-3.redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-admin-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-docs-webapp-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-el-3.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-javadoc-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-jsp-2.3-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-lib-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-native-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-native-debuginfo-0:1.2.30-3.redhat_3.el8jws.x86_64", "8Base-JWS-5.6:jws5-tomcat-selinux-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-servlet-4.0-api-0:9.0.50-3.redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-vault-0:1.1.8-4.Final_redhat_00004.1.el8jws.src", "8Base-JWS-5.6:jws5-tomcat-vault-javadoc-0:1.1.8-4.Final_redhat_00004.1.el8jws.noarch", "8Base-JWS-5.6:jws5-tomcat-webapps-0:9.0.50-3.redhat_00004.1.el8jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS" } ] }
rhsa-2021_4863
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 5.6.0 zip release is now available for Red Hat\nEnterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows.\n\nRed Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References.\n\nSecurity Fix(es):\n\n* tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340)\n* tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037)\n* tomcat: JNDI realm authentication weakness (CVE-2021-30640)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4863", "url": "https://access.redhat.com/errata/RHSA-2021:4863" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4863.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 5.6.0 Security release", "tracking": { "current_release_date": "2024-11-15T11:59:47+00:00", "generator": { "date": "2024-11-15T11:59:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4863", "initial_release_date": "2021-11-30T14:25:37+00:00", "revision_history": [ { "date": "2021-11-30T14:25:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-30T14:25:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:59:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 5", "product": { "name": "Red Hat JBoss Web Server 5", "product_id": "Red Hat JBoss Web Server 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:5.6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930324" } ], "notes": [ { "category": "description", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: integer overflow in CipherUpdate", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "RHBZ#1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: integer overflow in CipherUpdate" }, { "cve": "CVE-2021-23841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930310" } ], "notes": [ { "category": "description", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "RHBZ#1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" }, { "category": "workaround", "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"", "product_ids": [ "Red Hat JBoss Web Server 5" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()" }, { "cve": "CVE-2021-30640", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981544" } ], "notes": [ { "category": "description", "text": "A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: JNDI realm authentication weakness", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30640" }, { "category": "external", "summary": "RHBZ#1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30640", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: JNDI realm authentication weakness" }, { "cve": "CVE-2021-33037", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981533" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP request smuggling when used with a reverse proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33037" }, { "category": "external", "summary": "RHBZ#1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33037", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33037" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: HTTP request smuggling when used with a reverse proxy" }, { "cve": "CVE-2021-42340", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2014356" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Apache Tomcat, where an HTTP upgrade connection does not release for WebSocket connections once the WebSocket connection is closed. If a sufficient number of such requests are made, an OutOfMemoryError occurs, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenStack Platform, Tomcat is provided as a component of OpenDaylight. This flaw will not receive a fix as OpenDaylight was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.\n\nRed Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42340" }, { "category": "external", "summary": "RHBZ#2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E", "url": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-30T14:25:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4863" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 5" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS" } ] }
rhsa-2021_4613
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10 zip release for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8, and Microsoft Windows is available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 10 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 9 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* httpd: Single zero byte stack overflow in mod_auth_digest (CVE-2020-35452)\n* httpd: mod_session NULL pointer dereference in parser (CVE-2021-26690)\n* httpd: Heap overflow in mod_session (CVE-2021-26691)\n* httpd: mod_proxy_wstunnel tunneling of non Upgraded connection (CVE-2019-17567)\n* httpd: MergeSlashes regression (CVE-2021-30641)\n* httpd: mod_proxy NULL pointer dereference (CVE-2020-13950)\n* jbcs-httpd24-openssl: openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n* pcre: buffer over-read in JIT when UTF is disabled (CVE-2019-20838)\n* pcre: integer overflow in libpcre (CVE-2020-14155)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4613", "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1848436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436" }, { "category": "external", "summary": "1848444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444" }, { "category": "external", "summary": "1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "1966724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724" }, { "category": "external", "summary": "1966729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729" }, { "category": "external", "summary": "1966732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732" }, { "category": "external", "summary": "1966738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738" }, { "category": "external", "summary": "1966740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740" }, { "category": "external", "summary": "1966743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4613.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP10 security update", "tracking": { "current_release_date": "2024-11-15T11:59:08+00:00", "generator": { "date": "2024-11-15T11:59:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4613", "initial_release_date": "2021-11-10T17:14:06+00:00", "revision_history": [ { "date": "2021-11-10T17:14:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-10T17:14:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:59:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Apache project", "Mikhail Egorov" ] } ], "cve": "CVE-2019-17567", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966740" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17567" }, { "category": "external", "summary": "RHBZ#1966740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966740" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17567", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17567" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17567" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Only configurations which use mod_proxy_wstunnel are affected by this flaw. It is also safe to comment-out the \"LoadModule proxy_wstunnel_module ... \" line in /etc/httpd/conf.modules.d/00-proxy.conf for configurations which do not rely on a websockets reverse proxy.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_wstunnel tunneling of non Upgraded connection" }, { "cve": "CVE-2019-20838", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848444" } ], "notes": [ { "category": "description", "text": "libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \\X or \\R has more than one fixed quantifier, a related issue to CVE-2019-20454.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20838" }, { "category": "external", "summary": "RHBZ#1848444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20838", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20838" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Do not use more than one fixed quantifier with \\R or \\X with UTF disabled in PCRE or PCRE2, as these are the conditions needed to trigger the flaw.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: Buffer over-read in JIT when UTF is disabled and \\X or \\R has fixed quantifier greater than 1" }, { "acknowledgments": [ { "names": [ "the Apache project", "Marc Stern" ] } ], "cve": "CVE-2020-13950", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966738" } ], "notes": [ { "category": "description", "text": "A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy NULL pointer dereference", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13950" }, { "category": "external", "summary": "RHBZ#1966738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966738" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13950", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13950" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_proxy NULL pointer dereference" }, { "cve": "CVE-2020-14155", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2020-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848436" } ], "notes": [ { "category": "description", "text": "libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Integer overflow when parsing callout numeric arguments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14155" }, { "category": "external", "summary": "RHBZ#1848436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848436" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14155", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14155" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "This flaw can be mitigated by not compiling regular expressions with a callout value greater outside of 0-255 or handling the value passed to the callback within the application code.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: Integer overflow when parsing callout numeric arguments" }, { "acknowledgments": [ { "names": [ "the Apache project" ] }, { "names": [ "Antonio Morales" ], "organization": "GHSL" } ], "cve": "CVE-2020-35452", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966724" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Single zero byte stack overflow in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a one byte overflow and as per upstream it should be non-exploitable in most condtions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-35452" }, { "category": "external", "summary": "RHBZ#1966724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-35452", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35452" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Only configurations which use mod_auth_digest are affected by this flaw. Also as per upstream this flaw is not exploitable in most conditions, so there should really be no impact of this flaw.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Single zero byte stack overflow in mod_auth_digest" }, { "cve": "CVE-2021-3688", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990252" } ], "notes": [ { "category": "description", "text": "A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3688" }, { "category": "external", "summary": "RHBZ#1990252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3688", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3688" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3688" } ], "release_date": "2021-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Manually add LocationMatch directive to deny any possible problem requests in the JBCS httpd configuration. For example:\n~~~\n\u003cLocationMatch \".*\\.\\.;.*\"\u003e\n Require all denied\n\u003c/LocationMatch\u003e\n~~~", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBCS: URL normalization issue with dot-dot-semicolon(s) leads to information disclosure" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930324" } ], "notes": [ { "category": "description", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissible length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: integer overflow in CipherUpdate", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw only affects applications which are compiled with OpenSSL and using EVP_CipherUpdate, EVP_EncryptUpdate or EVP_DecryptUpdate functions. When specially-crafted values are passed to these functions, it can cause the application to crash or behave incorrectly.\n\nOpenSSL in Red Hat Enterprise Linux 9 was marked as not affected as its already fixed in RHEL9 Alpha release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23840" }, { "category": "external", "summary": "RHBZ#1930324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23840", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: integer overflow in CipherUpdate" }, { "cve": "CVE-2021-23841", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930310" } ], "notes": [ { "category": "description", "text": "The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a a null pointer dereference in the X509_issuer_and_serial_hash() function, which can result in crash if called by an application compiled with OpenSSL, by passing a specially-crafted certificate. OpenSSL internally does not use this function.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23841" }, { "category": "external", "summary": "RHBZ#1930310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23841", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23841" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210216.txt", "url": "https://www.openssl.org/news/secadv/20210216.txt" } ], "release_date": "2021-02-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "As per upstream \"The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources.\"", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: NULL pointer dereference in X509_issuer_and_serial_hash()" }, { "acknowledgments": [ { "names": [ "the Apache project" ] }, { "names": [ "Antonio Morales" ], "organization": "GHSL" } ], "cve": "CVE-2021-26690", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966729" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session: NULL pointer dereference when parsing Cookie header", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a null pointer deference caused when using mod_session. It can result in crash of httpd child process by a remote attacker.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26690" }, { "category": "external", "summary": "RHBZ#1966729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966729" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26690" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session: NULL pointer dereference when parsing Cookie header" }, { "acknowledgments": [ { "names": [ "the Apache project", "Christophe Jaillet" ] } ], "cve": "CVE-2021-26691", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966732" } ], "notes": [ { "category": "description", "text": "A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_session: Heap overflow via a crafted SessionHeader value", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can result in a crash of the httpd child process when mod_session is used.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26691" }, { "category": "external", "summary": "RHBZ#1966732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26691", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26691" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Only configurations which use the \"SessionEnv\" directive (which is not widely used) are vulnerable to this flaw. SessionEnv is not enabled in default configuration of httpd package shipped with Red Hat Products.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_session: Heap overflow via a crafted SessionHeader value" }, { "acknowledgments": [ { "names": [ "the Apache project", "Christoph Anton Mitterer" ] } ], "cve": "CVE-2021-30641", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966743" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was introduced when fixing https://access.redhat.com/security/cve/cve-2019-0220, therefore versions of httpd package shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Software Collections are affected by this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30641" }, { "category": "external", "summary": "RHBZ#1966743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30641" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30641" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "This issue can be mitigated by setting the \"MergeSlashes\" directive to OFF", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Unexpected URL matching with \u0027MergeSlashes OFF\u0027" }, { "cve": "CVE-2021-34798", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005128" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference via malformed requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-34798" }, { "category": "external", "summary": "RHBZ#2005128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005128" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-34798", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2021-09-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-10T17:14:06+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: NULL pointer dereference via malformed requests" } ] }
rhsa-2022_0064
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0064", "url": "https://access.redhat.com/errata/RHSA-2022:0064" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0064.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-10T18:30:58+00:00", "generator": { "date": "2024-11-10T18:30:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0064", "initial_release_date": "2022-01-11T18:03:42+00:00", "revision_history": [ { "date": "2022-01-11T18:03:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-11T18:03:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-10T18:30:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-23.el7_9.src", "product": { "name": "openssl-1:1.0.2k-23.el7_9.src", "product_id": "openssl-1:1.0.2k-23.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-23.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "product_id": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.i686", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.i686", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.i686", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686", "product_id": "openssl-static-1:1.0.2k-23.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "product_id": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "product_id": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.ppc", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc", "product_id": "openssl-static-1:1.0.2k-23.el7_9.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.s390x", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x", "product_id": "openssl-static-1:1.0.2k-23.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.0.2k-23.el7_9.s390", "product": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390", "product_id": "openssl-devel-1:1.0.2k-23.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.2k-23.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.2k-23.el7_9.s390", "product": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390", "product_id": "openssl-libs-1:1.0.2k-23.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.2k-23.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "product": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "product_id": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.2k-23.el7_9?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.2k-23.el7_9.s390", "product": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390", "product_id": "openssl-static-1:1.0.2k-23.el7_9.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.2k-23.el7_9?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-devel-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-libs-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-perl-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.2k-23.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" }, "product_reference": "openssl-static-1:1.0.2k-23.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-11T18:03:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0064" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Client-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Client-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7ComputeNode-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7ComputeNode-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Server-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Server-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.src", "7Workstation-optional-7.9.Z:openssl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-debuginfo-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-devel-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-libs-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-perl-1:1.0.2k-23.el7_9.x86_64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.i686", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.ppc64le", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.s390x", "7Workstation-optional-7.9.Z:openssl-static-1:1.0.2k-23.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" } ] }
rhsa-2021_4618
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 General\nAvailability release images, which fix several bugs and security issues.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.4/html/release_notes/\n\nSecurity fixes: \n\n* CVE-2021-33623: nodejs-trim-newlines: ReDoS in .end() method\n\n* CVE-2021-32626: redis: Lua scripts can overflow the heap-based Lua stack\n\n* CVE-2021-32627: redis: Integer overflow issue with Streams\n\n* CVE-2021-32628: redis: Integer overflow bug in the ziplist data structure\n\n* CVE-2021-32672: redis: Out of bounds read in lua debugger protocol parser\n\n* CVE-2021-32675: redis: Denial of service via Redis Standard Protocol (RESP) request\n\n* CVE-2021-32687: redis: Integer overflow issue with intsets\n\n* CVE-2021-32690: helm: information disclosure vulnerability\n\n* CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite\n\n* CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite\n\n* CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n\n* CVE-2021-3711: openssl: SM2 Decryption Buffer Overflow\n\n* CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings\n\n* CVE-2021-3749: nodejs-axios: Regular expression denial of service in trim function\n\n* CVE-2021-41099: redis: Integer overflow issue with strings\n\nBug fixes:\n\n* RFE ACM Application management UI doesn\u0027t reflect object status (Bugzilla #1965321)\n\n* RHACM 2.4 files (Bugzilla #1983663)\n\n* Hive Operator CrashLoopBackOff when deploying ACM with latest downstream 2.4 (Bugzilla #1993366)\n\n* submariner-addon pod failing in RHACM 2.4 latest ds snapshot (Bugzilla #1994668)\n\n* ACM 2.4 install on OCP 4.9 ipv6 disconnected hub fails due to multicluster pod in clb (Bugzilla #2000274)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2003915)\n\n* InfraEnv condition does not reflect the actual error message (Bugzilla #2009204, 2010030)\n\n* Flaky test point to a nil pointer conditions list (Bugzilla #2010175)\n\n* InfraEnv status shows \u0027Failed to create image: internal error (Bugzilla #2010272)\n\n* subctl diagnose firewall intra-cluster - failed VXLAN checks (Bugzilla #2013157)\n\n* pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2014084)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4618", "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "1965321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965321" }, { "category": "external", "summary": "1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1983663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983663" }, { "category": "external", "summary": "1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "1993366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993366" }, { "category": "external", "summary": "1994668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994668" }, { "category": "external", "summary": "1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2000274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000274" }, { "category": "external", "summary": "2003915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003915" }, { "category": "external", "summary": "2009204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009204" }, { "category": "external", "summary": "2010030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010030" }, { "category": "external", "summary": "2010175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010175" }, { "category": "external", "summary": "2010272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010272" }, { "category": "external", "summary": "2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "2013157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013157" }, { "category": "external", "summary": "2014084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4618.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates", "tracking": { "current_release_date": "2024-11-15T11:58:57+00:00", "generator": { "date": "2024-11-15T11:58:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4618", "initial_release_date": "2021-11-11T18:31:07+00:00", "revision_history": [ { "date": "2021-11-11T18:31:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-11T18:31:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:58:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.4::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_id": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_id": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_id": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_id": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_id": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_id": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_id": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_id": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_id": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-operator-bundle\u0026tag=v2.4.0-168" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_id": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_id": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_id": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_id": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_id": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_id": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_id": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_id": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_id": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_id": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_id": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_id": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-agent-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_id": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_id": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_id": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_id": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_id": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_id": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_id": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_id": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_id": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_id": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_id": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_id": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_id": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-image-service-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_id": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_id": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_id": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_id": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_id": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_id": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_id": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_id": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_id": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_id": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_id": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_id": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_id": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_id": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_id": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_id": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_id": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_id": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_id": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/assisted-installer-reporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_id": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_id": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_id": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_id": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_id": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_id": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_id": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_id": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_id": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_id": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_id": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.4.0-164" } } }, { "category": "product_version", "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_id": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "product_identification_helper": { "purl": "pkg:oci/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/application-ui-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_id": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_id": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel8-operator\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_id": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterclaims-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_id": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-curator-controller-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_id": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "product_identification_helper": { "purl": "pkg:oci/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/clusterlifecycle-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_id": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-proxy-addon-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_id": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_id": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "product_identification_helper": { "purl": "pkg:oci/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-api-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_id": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel8\u0026tag=v2.4.0-53" } } }, { "category": "product_version", "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_id": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "product_identification_helper": { "purl": "pkg:oci/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/discovery-rhel8-operator\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_id": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-spec-sync-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_id": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-status-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_id": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-template-sync-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_id": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-api-rhel8\u0026tag=v2.4.0-13" } } }, { "category": "product_version", "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_id": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "product_identification_helper": { "purl": "pkg:oci/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grc-ui-rhel8\u0026tag=v2.4.0-47" } } }, { "category": "product_version", "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_id": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "product_identification_helper": { "purl": "pkg:oci/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/iam-policy-controller-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_id": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel8\u0026tag=v2.4.0-16" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_id": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_id": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-rhel8-operator\u0026tag=v2.4.0-17" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_id": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_id": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "product_identification_helper": { "purl": "pkg:oci/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/managedcluster-import-controller-rhel8\u0026tag=v2.4.0-21" } } }, { "category": "product_version", "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_id": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "product_identification_helper": { "purl": "pkg:oci/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/management-ingress-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_id": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_id": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_id": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel8\u0026tag=v2.4.0-25" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_id": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel8\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_id": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-manager-rhel8\u0026tag=v2.4.0-19" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_id": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel8\u0026tag=v2.4.0-36" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_id": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-repo-rhel8\u0026tag=v2.4.0-48" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_id": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel8-operator\u0026tag=v2.4.0-24" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_id": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-deployable-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_id": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-placementrule-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel8\u0026tag=v2.4.0-40" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_id": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-release-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_id": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel8\u0026tag=v2.4.0-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_id": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_id": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel8-operator\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_id": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "product_identification_helper": { "purl": "pkg:oci/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/openshift-hive-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_id": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "product_identification_helper": { "purl": "pkg:oci/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/placement-rhel8\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_id": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_id": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "product_identification_helper": { "purl": "pkg:oci/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/provider-credential-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel8\u0026tag=v2.4.0-23" } } }, { "category": "product_version", "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_id": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "product_identification_helper": { "purl": "pkg:oci/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/redisgraph-tls-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_id": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8\u0026tag=v2.4.0-9" } } }, { "category": "product_version", "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_id": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "product_identification_helper": { "purl": "pkg:oci/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/registration-rhel8-operator\u0026tag=v2.4.0-11" } } }, { "category": "product_version", "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_id": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "product_identification_helper": { "purl": "pkg:oci/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/agent-service-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_id": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "product_identification_helper": { "purl": "pkg:oci/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-aggregator-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_id": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "product_identification_helper": { "purl": "pkg:oci/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-api-rhel8\u0026tag=v2.4.0-15" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_id": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel8\u0026tag=v2.4.0-14" } } }, { "category": "product_version", "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_id": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "product_identification_helper": { "purl": "pkg:oci/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-rhel8\u0026tag=v2.4.0-10" } } }, { "category": "product_version", "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_id": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "product_identification_helper": { "purl": "pkg:oci/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-ui-rhel8\u0026tag=v2.4.0-20" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_id": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel8\u0026tag=v2.4.0-33" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_id": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel8\u0026tag=v2.4.0-8" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_id": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-rhel8\u0026tag=v2.4.0-6" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_id": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rclone-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_id": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-restic-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_id": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "product_identification_helper": { "purl": "pkg:oci/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/volsync-mover-rsync-rhel8\u0026tag=v2.4.0-4" } } }, { "category": "product_version", "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_id": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "product_identification_helper": { "purl": "pkg:oci/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/work-rhel8\u0026tag=v2.4.0-8" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le" }, "product_reference": "rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le" }, "product_reference": "rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le" }, "product_reference": "rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64" }, "product_reference": "rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le" }, "product_reference": "rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64" }, "product_reference": "rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le" }, "product_reference": "rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x" }, "product_reference": "rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le" }, "product_reference": "rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64" }, "product_reference": "rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x" }, "product_reference": "rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64" }, "product_reference": "rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le" }, "product_reference": "rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le" }, "product_reference": "rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x" }, "product_reference": "rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64" }, "product_reference": "rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le" }, "product_reference": "rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le" }, "product_reference": "rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64" }, "product_reference": "rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64" }, "product_reference": "rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x" }, "product_reference": "rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64" }, "product_reference": "rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x" }, "product_reference": "rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64" }, "product_reference": "rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64" }, "product_reference": "rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64" }, "product_reference": "rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64" }, "product_reference": "rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x" }, "product_reference": "rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x" }, "product_reference": "rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64" }, "product_reference": "rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le" }, "product_reference": "rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64" }, "product_reference": "rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x" }, "product_reference": "rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64" }, "product_reference": "rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x" }, "product_reference": "rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64" }, "product_reference": "rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x" }, "product_reference": "rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64" }, "product_reference": "rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64" }, "product_reference": "rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x" }, "product_reference": "rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64" }, "product_reference": "rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le" }, "product_reference": "rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x" }, "product_reference": "rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64" }, "product_reference": "rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64" }, "product_reference": "rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x" }, "product_reference": "rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le" }, "product_reference": "rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x" }, "product_reference": "rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64" }, "product_reference": "rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64" }, "product_reference": "rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x" }, "product_reference": "rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le" }, "product_reference": "rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64" }, "product_reference": "rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64" }, "product_reference": "rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64" }, "product_reference": "rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x" }, "product_reference": "rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le" }, "product_reference": "rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le" }, "product_reference": "rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le" }, "product_reference": "rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x" }, "product_reference": "rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64" }, "product_reference": "rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64" }, "product_reference": "rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x" }, "product_reference": "rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64" }, "product_reference": "rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x" }, "product_reference": "rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64" }, "product_reference": "rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le" }, "product_reference": "rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le" }, "product_reference": "rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64" }, "product_reference": "rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "relates_to_product_reference": "8Base-RHACM-2.4" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8", "product_id": "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" }, "product_reference": "rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x", "relates_to_product_reference": "8Base-RHACM-2.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "John Ouyang", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3711", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995623" } ], "notes": [ { "category": "description", "text": "A flaw was found in openssl. A miscalculation of a buffer size was found in openssl\u0027s SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: SM2 Decryption Buffer Overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenSSL packages shipped with Red Hat Enterprise Linux 8 are not compiled with support for SM2 algorithm and therefore are not affected by this flaw. Packages shipped with Red Hat Enterprise Linux 7 and older do not support the SM2 algorithm. \n\nThe Red Hat Advanced Cluster Management for Kubernetes 2.3.1 and the previous versions are using the vulnerable version of the OpenSSL library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3711" }, { "category": "external", "summary": "RHBZ#1995623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3711", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: SM2 Decryption Buffer Overflow" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1963121" } ], "notes": [ { "category": "description", "text": "A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23017" }, { "category": "external", "summary": "RHBZ#1963121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23017" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32626", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011017" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow was found in redis. Specially crafted Lua scripts executing in Redis cause the heap-based Lua stack to overflow due to incomplete checks for this condition. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Lua scripts can overflow the heap-based Lua stack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32626" }, { "category": "external", "summary": "RHBZ#2011017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32626", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32626" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c", "url": "https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Lua scripts can overflow the heap-based Lua stack" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32627", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011010" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"proto-max-bulk-len\" and \"client-query-buffer-limit\" configuration parameters to very large values and constructing specially crafted large stream elements. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with Streams", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32627" }, { "category": "external", "summary": "RHBZ#2011010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32627", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32627" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v", "url": "https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with Streams" }, { "acknowledgments": [ { "names": [ "sundb" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32628", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011004" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in the redis ziplist data structure. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value) to a very large value, and then constructing specially crafted commands to create very large ziplists. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow bug in the ziplist data structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32628" }, { "category": "external", "summary": "RHBZ#2011004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011004" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32628", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr", "url": "https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the above configuration parameters. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow bug in the ziplist data structure" }, { "acknowledgments": [ { "names": [ "Meir Shpilraien" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32672", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011001" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger\u2019s protocol parser to read data beyond the actual buffer, potentially leading to an information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Out of bounds read in lua debugger protocol parser", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32672" }, { "category": "external", "summary": "RHBZ#2011001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32672", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm", "url": "https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "redis: Out of bounds read in lua debugger protocol parser" }, { "cve": "CVE-2021-32675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011000" } ], "notes": [ { "category": "description", "text": "A flaw was found in redis. When parsing an incoming Redis Standard Protocol (RESP) request, redis allocates memory according to user-specified values, which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). This flaw allows an unauthenticated, remote user delivering specially crafted requests over multiple connections to cause the server to allocate a significant amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Denial of service via Redis Standard Protocol (RESP) request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32675" }, { "category": "external", "summary": "RHBZ#2011000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32675", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p", "url": "https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "Prevent unauthenticated users from connecting to Redis by using network access control tools (e.g., firewalls) or enabling TLS and requiring users to authenticate using client side certificates.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Denial of service via Redis Standard Protocol (RESP) request" }, { "acknowledgments": [ { "names": [ "Pawel Wieczorkiewicz" ], "organization": "Amazon Web Services", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-32687", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010991" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis. The vulnerability involves changing the default \"set-max-intset-entries\" configuration parameter to a very large value and constructing specially crafted commands to manipulate sets. This flaw allows a remote attacker to leak arbitrary contents of the heap or potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with intsets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32687" }, { "category": "external", "summary": "RHBZ#2010991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32687", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q", "url": "https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `set-max-intset-entries` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with intsets" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990415" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. However, npm explicitly prevents the extraction of symlink via a filter. npm might still be affected via node-gyp, if the attacker is able to control the target URL.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32803" }, { "category": "external", "summary": "RHBZ#1990415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32803", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1990409" } ], "notes": [ { "category": "description", "text": "The npm package \"tar\" (aka node-tar) has an arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Quay 3.3 uses an affected version of nodejs-tar. However Quay 3.3 is in extended life phase and a fix will not be delivered[1]. More recent versions of Red Hat Quay do not include nodejs-tar and are not affected.\n\n1. https://access.redhat.com/support/policy/updates/rhquay\n\nRed Hat Enterprise Linux version 8 and Red Hat Software Collection both embed node-tar in the npm command. A specially crafted node module could create and overwrite files outside of its dedicated directory.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32804" }, { "category": "external", "summary": "RHBZ#1990409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9", "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9" } ], "release_date": "2021-08-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite" }, { "cve": "CVE-2021-33623", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966615" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-trim-newlines. Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-trim-newlines: ReDoS in .end() method", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of nodejs trim-newlines. However due to the instance being read only and behind OpenShift OAuth, the impact by this vulnerability is Low. Red Hat Advanced Cluster Management for Kubernetes (ACM) containers affected by this flaw are only accessible to authenticated users, thus the impact of this vulnerability is Low. \nRed Hat Virtualization (RHV) does package a vulnerable version of nodejs-trim-newlines. However, no untrusted content is being parsed therefore the impact of this vulnerability is Low.\n\nThe hosted services are shipped with the vulnerable packages, however the vulnerable methods were not identified in use at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33623" }, { "category": "external", "summary": "RHBZ#1966615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33623", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" } ], "release_date": "2021-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-trim-newlines: ReDoS in .end() method" }, { "acknowledgments": [ { "names": [ "yiyuaner" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-41099", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011020" } ], "notes": [ { "category": "description", "text": "An integer overflow issue was found in redis in the underlying string library. The vulnerability involves changing the default \"proto-max-bulk-len\" configuration parameter to a very large value and constructing specially crafted network payloads or commands. This flaw allows a remote attacker to corrupt the heap and potentially trigger remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "redis: Integer overflow issue with strings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41099" }, { "category": "external", "summary": "RHBZ#2011020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41099", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099" }, { "category": "external", "summary": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph", "url": "https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph" } ], "release_date": "2021-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-11T18:31:07+00:00", "details": "For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4618" }, { "category": "workaround", "details": "The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the `proto-max-bulk-len` configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.", "product_ids": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:496954af2d9c5262516cb87c8390f80791826d4d23a7392f06c248f0cb99afe2_s390x", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:ef85ee276e8c2f44eea536a45971eb708614cc047111ef1061401d4b9760168c_amd64", "8Base-RHACM-2.4:rhacm2/acm-grafana-rhel8@sha256:fd564325005bdde50413b581cfa0ac58e37bce64ccebebac0b70651a06a5a183_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:0a5eeb0b6a5b990fa2ac7ba8ce4d44084f2a1f93265249ce8f3b8cd9dff78e70_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:acedcbb6483e2b6b51f69900de4f582f48a486114ef6ecaede82f1f549fb4ebf_amd64", "8Base-RHACM-2.4:rhacm2/acm-must-gather-rhel8@sha256:f2dd5096ad17d494211d3b8f93c423ea35d3041f0325fa2e26ff60897c95df99_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:17f71990d653d75ec9b55a3044b898068300795e685baac2e6a9db59100c95c9_s390x", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:22b9c240d63133031d2b869b57673abf63cb6f20c535a2c5e7f6fa3e635d32e4_ppc64le", "8Base-RHACM-2.4:rhacm2/acm-operator-bundle@sha256:234ff9f1dc4db52a2722a4b7779b547ddaf6b8a611252f2f1d42648d49879be8_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:328f595cdf69ac14e03cd14ad4120cca0c460a57f86ee9bac5cd4e7a396452a4_s390x", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:acd4c5342ce6c159c0d9a05f4dae29d9ef4d319ba395f0e56cd09f368ca76ca2_amd64", "8Base-RHACM-2.4:rhacm2/agent-service-rhel8@sha256:cf8aa0ce33abb7d0cb7304d4719ddd5cd36135efff39135b29822c7002c3c0e8_ppc64le", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:1cbdb0563a9435a6a1ef958a35bbe4000c179d49ee3dca6e3798789bce9eec2f_amd64", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:2cfaa4e8d034f0c9ece63e2e82811bf91bef8d6398d81763f1a39547e9bf36e0_s390x", "8Base-RHACM-2.4:rhacm2/application-ui-rhel8@sha256:44b3cf1b1175c5338b5e84e0f11d2cdd3563273519774252ebc97db24d161c6e_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:2fda600b1bda57b551ea7a49a7c1188e250ee5fbb062046778ba36d629fc8ff0_amd64", "8Base-RHACM-2.4:rhacm2/assisted-image-service-rhel8@sha256:b5fb0dbece2bb3f022b4c2d84297c9e48f8281b3cea02b46c8da7d66c87d3042_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-agent-rhel8@sha256:ce03294937f56f7a7bb0cea24126ad4f715eb147359d32ab1470c666cb31a5be_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:4e56dd6660914111e9034f126043668dc78d833f9066d43f9d287fd9d38a7a56_amd64", "8Base-RHACM-2.4:rhacm2/assisted-installer-reporter-rhel8@sha256:8e2ad59d93d64b81064d2901b162961d44400ca53970ffa5c4118405af507db9_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:2a5f8abcadf5dacd303392372c2bdaae838e7650ca23f015f43c96f0960298e4_ppc64le", "8Base-RHACM-2.4:rhacm2/assisted-installer-rhel8@sha256:8e719e41b950700f894d912227e0a1005cf0370fe587b042b185841227f77514_amd64", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:0b05bdb6de7165855c4edf0e93c575647df52acff97861978a51809cb9a95f1d_ppc64le", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:2052786ac778bdefa85a1de0089c5b4e5173da2d250f9ee2325d2c424893e05b_s390x", "8Base-RHACM-2.4:rhacm2/cert-policy-controller-rhel8@sha256:5b8fa00c0d0912b776700cecc33e10df159d8a8963f478a5159cdd6a15582446_amd64", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:03a6b0a7eb0067654344dde605219062496c7e174c8b7f16428c9df3b2ce18e1_s390x", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:3b0397a2f6417d9753158854fbaf9c25d3d76b926bf1edf28c3906b12ae93654_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-backup-rhel8-operator@sha256:b778cc31c51a2b8d5458ddefb5398b3e603da117232845fa56f1ced0801a6491_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:8e34a5d87d837df2db422e3f9b9c084b1318d1ff3a8ac2c4cd825abf5ef20166_s390x", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:a7cb82152dd9dd80de20e43164074f0164a1d78fda658e5ae87d5872b6f1696c_amd64", "8Base-RHACM-2.4:rhacm2/cluster-curator-controller-rhel8@sha256:aa9e0ce5711f66bd866be0d3165ef885cb57557662d4ce232a755b37fc6059ed_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:01e2bad35d03e85f9b954a09a89abed92bdfc10e0a11f127e4fba9892f9eca4f_ppc64le", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:0999e1274ceb2921b8913af4c6b6d93157a19dd8ff31a88d7b53ed80c132b5c9_amd64", "8Base-RHACM-2.4:rhacm2/cluster-proxy-addon-rhel8@sha256:b146f2a1976f7e07a4b7a04ce3d8ac9668c78d0efd440cd0e21d78476c4b9dc0_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:141e3b3eaf5635cbf3cb4dc6650977d21433647d03756e568994b0d9da611884_amd64", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:2eec76afed24cdefd120576c447af1ed589cb59533e877901d4f0562cbb10738_s390x", "8Base-RHACM-2.4:rhacm2/clusterclaims-controller-rhel8@sha256:c5fbbef062f68e8b172786294b3358b3e3a2bb0e68cc3ae9c5fe08c516c4cd24_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:46c7b54aacb6fa4c170272bfa35e807612f0b4d2e2df12bec5539a67422dacb8_ppc64le", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:5a270b4535481adce7c2948709c301b5b50815ab694e4ea1bcc0fc3dbd1d329f_s390x", "8Base-RHACM-2.4:rhacm2/clusterlifecycle-state-metrics-rhel8@sha256:f6b7b9726506a32821a6d9ac1e0f14ee713ae317f80480c0ddd7a4c19909985f_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:85d836d154cde6820f10c830e5a4ba8c72b74d4365e6712cfca8deaba7a0cd69_amd64", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:e474589cf328fcdd43e1b1cc99839548e97470a3928f021361ddb23a1b3d2a26_s390x", "8Base-RHACM-2.4:rhacm2/config-policy-controller-rhel8@sha256:f0adbc4cf3150d3e2a522c0a6f1782dfcce8f5be84f091e9186ae7d242e6636c_ppc64le", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:270a7c21b5a66b5a79cdebcd1a9ef2a2cfd7e80139223ae0ef249ab788a52328_s390x", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:46b3c2de479a68cae7750781cd16dca8c4eb0d92a96f4ba84fac5469fb95e7af_amd64", "8Base-RHACM-2.4:rhacm2/console-api-rhel8@sha256:6890f723eb5fb060c1b7051e9be75f007faf7da718133aa104df3d3fd7510815_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:0248bb75d3bb0f320d27bebee8e1c77c9d5fdd0d86c0dbe4c2ea3f0ecd337395_ppc64le", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f0261f5ca977bdbb9655a487835f64a617ffc2e344ad1160f3c97ddcc4d27ca_s390x", "8Base-RHACM-2.4:rhacm2/console-rhel8@sha256:2f045a187653319650e842fe43ca3d9ef66d766ebe801089dc4a174a3ee2db35_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:0032dbe1b265cc91c5bc454af7c29803030c88ba59ef2cb0ef567ce79138dde2_amd64", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:18e43d2c227ae2994de73e4637a1e8092ec47a00e6f62359486645f158d7e9ae_s390x", "8Base-RHACM-2.4:rhacm2/discovery-rhel8-operator@sha256:e8580a5b2605214f7310dcfe701dc1229432fbb128407fb13d70cad7d7c2ec55_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:2412f6a46f2e39c69197db53c8fa4141c1604fc0ab7ff5502c89812f7840a913_ppc64le", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:7070e5f969f0be340a9ec3095966072730c63b32115739d4227270d3b9991321_amd64", "8Base-RHACM-2.4:rhacm2/endpoint-monitoring-rhel8-operator@sha256:c494b3c906e5ca9561394ef626834ae4d042018233ff675334964291a887a49e_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:57d1bc240b0ae50f10f9c0082707106c501ade55b3a1cb28ec40ef8a26f5ebce_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:ab91ce87ebd505de340bdb532832b7068adea32d3b38df348f9655b158fcecc6_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-propagator-rhel8@sha256:eec9bebac554b32194e03de64f07398cf882ef8eecabe28dcd2656a3552327f6_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:2edfd3917f16d36453a8b32ae9b5e02df92ae30e859352c7746c13df34d92a10_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:597c1a59fc58c933e16199fb7cab7a0fe4ff6a845da004dd6c872e434e3d3708_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-spec-sync-rhel8@sha256:ae73f638a3a824cd79830e08eefa343b0c79711196b23a8f4b650fdccbf8433b_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:05adeadcac2ebd50ca5488537c19686c9510cb58f5918eb1418e3c2a2d3ee66c_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:6dbe408b6bb34737634ddcb8d773170ae1df4cd34930914b09f8c2b1b7b71e45_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-status-sync-rhel8@sha256:d073204edf479364f40790bd6557cb2fa3455923477b673f3cfd1c7d91fad4e5_amd64", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:0108cd4c4e51da352ef6bac45fb3a0a3a63e006bc17dec45f86fe5e1dddd372f_s390x", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:7ca40f321781481b2d093fe5e2d2ed69ec199d52fdbb11d91da57d316ba49310_ppc64le", "8Base-RHACM-2.4:rhacm2/governance-policy-template-sync-rhel8@sha256:f2e311084e8ec11b139e0e7c2e2f19d2294c4cfb447c712ca127835780b61d08_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:231f4dd885619d1954a0b738e16b534fffe4a7e624e762aa00035e1ade6b0c13_amd64", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:37877296908727ae0a2cc03864a7b27b8c9cf303c596eb9a80202a69521e5219_ppc64le", "8Base-RHACM-2.4:rhacm2/grafana-dashboard-loader-rhel8@sha256:b1603b326fa442700f7d327ba6f701069a69238c91333c9687d97fa745d30481_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:27a9d9d45fac2d43402b895552ef67fb82a5e1e1849cac77a474e46dd77f4d95_amd64", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:339ae7845caf6b5917dd054a913bd8436f555d3bd608017cf6a3ed8d067bc7f7_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-api-rhel8@sha256:9928f4e7f54018efb190c278a57db2c692f7179416dfa57a7b8013dbcd39f6fe_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:1341a1c1a6af7bc8da6c3db9a848cfc81468ebc09d618c70dfce763959103f61_s390x", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:59f5600732df989125b1a03d8a2b7879025badbeab973819a44cafe9671a0481_ppc64le", "8Base-RHACM-2.4:rhacm2/grc-ui-rhel8@sha256:feff61eb0b6f478af464ac72c4a209222201dc4641372f82319985dc22ec5089_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:4e5fd55717a90db39b8bf8f235943edd71a63c86e06393e4d8176127a7bdf289_amd64", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:edeead63167f85b0802eb6d02e5b316e5f61ecbb0fcc2e88d0ada99f28e30448_ppc64le", "8Base-RHACM-2.4:rhacm2/iam-policy-controller-rhel8@sha256:f6401d070ef6f67dec9516c73bd213873f1b1f5b0054a1712623cf5778d85c1c_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:45c43591196bc6f7fdad9213d88b275edf549bda1f7351e40c6525b2ab18ec59_ppc64le", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:73b19d23c56e0f3d7fe4d908292e8d338564cf3f5c54c1e840875457b090530f_s390x", "8Base-RHACM-2.4:rhacm2/insights-client-rhel8@sha256:d2933ac8cad0e4d66766e83dc5dba7008049edffafc82f37ba2fe74d8800ea46_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:0f97515792e4cc6f434fb4e4f7484c80b46f334e488ccd4510c0310dd7f69fe9_amd64", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:200901bfae28d2fbdd4ab8cacbd72d70bdc07890820c4d3971d78f7fdd3c04a3_s390x", "8Base-RHACM-2.4:rhacm2/insights-metrics-rhel8@sha256:a006e595c4c7f83fe0c7699451535dd18de68db987b06189fb995ac6cf80ded3_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:03f5c0944a6a1f312046a4102d5eadb4f7eb8145f0a9e417af43eaee8464189d_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:522c2fc01df0a8d009303d6415d044c43229878f1dc89154a39a191d4e75a236_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-controller-rhel8@sha256:d31595e64e308d2b816267486a04391fcdffe22ba5e165980e1ada2cf228a3b3_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:04837e3085f75a192ac09a0f3a45cfa36b1f943e70abd8b5210250ffff84dcc0_s390x", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:35a0d7ba37b9aa1c34cc917a99374bfe7809f62fc285d15eb118547109573f76_ppc64le", "8Base-RHACM-2.4:rhacm2/klusterlet-addon-rhel8-operator@sha256:761d39054c560019b4bc2825df0285a6ae54a3c682cd069129b3093577145b53_amd64", "8Base-RHACM-2.4:rhacm2/klusterlet-operator-bundle@sha256:fc6c2158669017e7a183ceccffbabb2b3045ab36cbea7e405d7ccad2c8d237d1_amd64", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:3a500d066eab234ef71578e955bc9b30f00cca711495b0fa3e9102e33d7bc266_s390x", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:68c9a413fe87dbf500518e661641d015543e71ae41eabda15830b6add6d7b38c_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-rbac-proxy-rhel8@sha256:efe5806b0c32235d9f72448c036acaa6637daf648b1e76fd427c18af00155340_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:045be647e9b87cacc2b3a116469bbe34881d9388fe9e001d740b630120f7d6d3_amd64", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:2d63c586965b2db3c757fece2313ea3fa8864b0ca3f316b25056e59c4e439ee9_ppc64le", "8Base-RHACM-2.4:rhacm2/kube-state-metrics-rhel8@sha256:96680857940ce4a70d9f1687d3cc1107a9e2a5cf5606271213b380496deff017_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1305f48d552d3968b160731109040139cd51fbe4fef94ffe75f4908510a80cff_s390x", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:1e06cacaad5a984cc2fbe06f1627160dc6083064beb46cc3a65c6cc27d3d17d8_ppc64le", "8Base-RHACM-2.4:rhacm2/managedcluster-import-controller-rhel8@sha256:9eff3c9feb560877b16d011272d56c0d1565b6c1307c3b687b7e60359682d049_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:2c0cbc4fcd32a632e61e1fa080601171ece0a0d6c372dd7d0d1c5dda9dd11035_ppc64le", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:35681f55b4b9ebf2ff22f1c6f6057a58ab4269297a8af846a2919c459cf90ecf_amd64", "8Base-RHACM-2.4:rhacm2/management-ingress-rhel8@sha256:5d676bb30907a700176875760647e783f68ac8bd9dc140b6abeae6765f620a78_s390x", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:03320a8b4c366dc18ce7870eda572141ab672e4728c19128376f03fb043d67f9_amd64", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:974288557786543310bbb5a0d94fb04ded6c89a6444b580e1006dbaf3772a6c2_ppc64le", "8Base-RHACM-2.4:rhacm2/memcached-exporter-rhel8@sha256:f3ce8159bb279576bafa316618431f563801b876ae8ab338dfa67b557ae86f2b_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:5f6ff8faa5bb6d308ea24134a721b35c5a72f5a702766d01adb20e7b83d1043e_s390x", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:d60b771a2e99d0a184e439afbc751a9aae07fbef55b5c6850105c59fb4493795_amd64", "8Base-RHACM-2.4:rhacm2/memcached-rhel8@sha256:e59281379d74111acc4869b554728ce441d8a25ae47fac46c1d52233f7adefc8_ppc64le", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:0699d6ade592ab5381abd97c4ec7d2413afe677084b28c8efc38b2c32da8ffaa_s390x", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:aacc19fbe090dadafe12666021850ef0cc8aa36df963b7d59544d8e2392b3665_amd64", "8Base-RHACM-2.4:rhacm2/metrics-collector-rhel8@sha256:f5127a066cf5a137ad313b1a245fd5fb92a6b6e58c46f01068b365b47ed13af9_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:22e043e888d8db93b837f8283afc493a5db3a54c31d429cf65f248fac16930f3_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:af9b395a47c3bc63bdd4cd32e43c2fe4c0c1451b47abf8bb7b7793a02f96d876_amd64", "8Base-RHACM-2.4:rhacm2/multicloud-integrations-rhel8@sha256:f4f2ab1f9908d429d55104c39fc1e1b019c99c51c1ae6c1a550fda0c3e16c3d1_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:488d4485d3b5e75d46359b9c26defae10dbbc5fb74456b25c773f442bc910684_s390x", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:c0ca36218ca30f6206aab8878d6d7b79a57aaf18e5531986de87e7bd57d53d6c_ppc64le", "8Base-RHACM-2.4:rhacm2/multicloud-manager-rhel8@sha256:cc014786d7ee35f41502edd6c3ce73c4376885258cc43d49532a6a41fa79d64e_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:47fa2b26f655ff3de6b20d09c91f620b7d3960ee49aca4ebcdc2976d7d824be0_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:b25b3e6cbb131ca1a157b988434a8b13ef29e5aa56d6703af8127e02306d825d_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-observability-rhel8-operator@sha256:e076369b59a189400ac486bcbfe86ae386ddd55501fb7ffcbceae9e8b74e47a8_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:5a64bdd5e913b8b8df45e1a9b47c007c1a4d79802a06fef8bcd7a059884962c4_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:8c90ebd6cbbec6e98e005f7f159f927578a5130f062f3cfb51972740a9f7f889_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-application-rhel8@sha256:b95ae0c58b767a10915cfd171bde52f1653b58ba8b62e5d14301aaac5c1fe8d7_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:35912753c56f5f049f890b0ccdbd74545c5df1771b65874fcbe89c8a0fa0a8cd_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:91961116e3d79d624b9fbdff735a8596586995ec738a0d111779bc3b621ff823_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-channel-rhel8@sha256:e93d61fd313a86c51a47cab2b155e7379a526b5f4667dc8b5954cfb296757b79_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:9362311a03c85f50e93efdc7a9e01d1389aabe19d6c20f7662b1f59ce90fb4eb_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:97ed0026b134d1da4ce29e1cc51bccd148e76dbdad863132c9454fcab188671a_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-deployable-rhel8@sha256:e0504916ab14dd4d68e035660112e0ac419b8f24e3a7340f939e3ee2e4e1d74d_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:1d0084fc88f2f8ab2ec79379c868515663eca7ba49200c88f90f01103156fe90_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ab2221e43ce33342efb5abd9de2db413456ee5ce6b3dbfec914c5b6558235c4b_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-placementrule-rhel8@sha256:ccef3b5826fe5b400b328d387319f7ed5009968a09a3dad3a973c696c6bc7e6b_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:8fbd81191917474bcebfd7540b48b373e5950a940acc6a2831769f3d1e0ac7d2_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:c80559c89c16ab03ef1d26bb4dc8dfa9a4540b4d62b0ae241afb5b53064c662f_amd64", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-release-rhel8@sha256:ff1020fb7980c4f3c4ba0c979ad1e1df7a32e96c75216dcad54851dfb4365200_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:351380e5ae21f2491c459144a2cd9e77f78504167f8d107f74ff846bb2ff597c_s390x", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:61d5f5531d2bf5c88e4b99b8c597948ca24ac4347d2ceb2d30383119f43e0bca_ppc64le", "8Base-RHACM-2.4:rhacm2/multicluster-operators-subscription-rhel8@sha256:b615888bf412348be8056d658d9862592b735c7ebfe138b716465c453add9b79_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:5bd9b04343c9e3a0f6b11b3c8ec1a5f8474bde7b7ceb00847d5b5aa98dc36764_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:70e4e6584f0f3d33b195353fddf85a4b1374f940742d25a50469e2bf18a11093_ppc64le", "8Base-RHACM-2.4:rhacm2/multiclusterhub-repo-rhel8@sha256:ba77f7b4ac92d5986c8517571ea0d78ec9a4e961ace712da7208c4c06f68d76a_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:26f711478d39606578ff1a06260d1afe57dc5cd2407c51ceb1b9c1885c1d9f9c_s390x", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:3609445136a12745be10b9015cc4ab20bb2d473f47a1a2da261f1cbcf483731a_amd64", "8Base-RHACM-2.4:rhacm2/multiclusterhub-rhel8@sha256:392d3345f65e7e1c47f38c6acc27cbca4e9b16fc7bd0c2ab63f41ad21cc41b0f_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:5301b472e68f0f9b293ee94de63393600c5fccc7f870457aa8eb2908fe4fec3c_s390x", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:86ae7ecb9189b71ad6b824af4f5a0a64cca054989f58ab063bf289ff6ff75ae5_ppc64le", "8Base-RHACM-2.4:rhacm2/node-exporter-rhel8@sha256:b3311fe6d733c9674565c0371321bd328ea7abb873bcf63322c0426e134bf922_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:1b44f4fc8abcc82fee23194d28b9a0afca15972e8a4ad1f2063f256d1442741e_amd64", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:24d345a0f8e25acb1ae09d1497c8898bae83820dda5b461525417ac20db18f5e_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8-operator@sha256:bb185635a94460e2e0e6f489a12a2931487b5b42ed3a8d2cbadefa9128989eaf_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:2530298839b87a5d63d43def6ab773fb236854191d69dc0abf4f04516e0c42ea_s390x", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:30e0849946427d52345bbe9666c954aaae96f7596d02cb620cab72da454a7662_ppc64le", "8Base-RHACM-2.4:rhacm2/observatorium-rhel8@sha256:3bdb0afdf485a71415294bf5591baa7c946ef8e914f087d2f550a67409d0797c_amd64", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:0cfe309244ce594a1cea953233cfb34fad056e2fc5e7bb008d9c14532555a564_s390x", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:46601b034fb3c0318f986598c5291dd64898dddcfe4b2d5f1ce6833b47ba3b9a_ppc64le", "8Base-RHACM-2.4:rhacm2/openshift-hive-rhel8@sha256:9c935c57c32e8067e922221df9228d080af3c490c36f8e284ed3e79533e14ee8_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:5d72e2d8fc5d815dcae9da295dfc9eada50339d0636ecbe6e0bc2f2ae1fd6281_s390x", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:7e0b4b1cfb4c114acbdbc4a7c701c20d9d076455ae8b44a7ba8b54ed2fb5e8e6_amd64", "8Base-RHACM-2.4:rhacm2/placement-rhel8@sha256:90c9424d9d9b25a293c781d758a7a41331b70fbe7563515a66b698801db4b39e_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3b36aa748c622b2bfb235efd417c526635fa08526b288b0db8d02a3397193714_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:3f5debf8f5b174e274326f0c924c295f8ad595844b4b9ecc4726b51a565932bb_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-alertmanager-rhel8@sha256:8381d536f9a543c95ff3e32b1b047c0935837ac670efe14668db0f2834698d26_s390x", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:88818cefd6456978848f1926f071e88563d752248ec0e7be87a2d3d1fbbb9edd_ppc64le", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:c6ab92ad3d328e2a16e10df133b557698b4aaaa87eac45038bdc1d9af8ca073f_amd64", "8Base-RHACM-2.4:rhacm2/prometheus-rhel8@sha256:e8ab9422fa0e37d6a894bc4c5f613bd03974b7d012c4dad2bd7b2ace1a949c3e_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:61dd4c94e69a0ec9533277c199c744076d45b929afebe3f28f5da4738bc55bf1_s390x", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:a8add28436846fbc4e089cccc2f024c5b78d28e03f92133aefadf44227d73b7b_ppc64le", "8Base-RHACM-2.4:rhacm2/provider-credential-controller-rhel8@sha256:e511182d5afe18ad900280a7b91df8e73ed93652678331aa0db8a65fa3e2b436_amd64", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:6cbcd17e51d6010286064d4e0f522e3469b30924230e5db5f09bca589e2eb81b_ppc64le", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:7eaf455ea17ca1ce13ff70910830163d73557454c67ad4b437f255e59be68d66_s390x", "8Base-RHACM-2.4:rhacm2/rbac-query-proxy-rhel8@sha256:9d94689ba783e9ce54e492941c7f4918d20db97b2654a17922faf16ed44db715_amd64", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:2515f16c35c7ecb61a6859064424fc092b6310dcd7e472673692e68594c9cbc6_ppc64le", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:4c5419a35f591b8fe0ccc60753fc7400c70f4a2addf110a00caef0d3ed3197f0_s390x", "8Base-RHACM-2.4:rhacm2/redisgraph-tls-rhel8@sha256:bc2afba5e2ea1539d35ae21db5ea7bb625f1787d9c2dd1411ac7906a0b01af37_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:0d2584921a3885f2b17223788fbe48a034995cb4f1e61babe0bae44c3580ae1a_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:3b856dcbf615232dfa3b8b6f932825893d395c7ace1be2cf9d67df05c5c63da2_amd64", "8Base-RHACM-2.4:rhacm2/registration-rhel8-operator@sha256:7d2205d0b6b93c4d7fdd38c9bdbe855c88a692cf3e52eb894e2bae6b020eb36a_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:49b8a6b6c70dcd6dbb14d67d3892eec49a46acd2fa834b4e88aeb65ddc270b26_ppc64le", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:a0ce0557422198251a3af90be3ea55322abfd1ad3f9f60598fcc962af215c854_s390x", "8Base-RHACM-2.4:rhacm2/registration-rhel8@sha256:b8d152b43f63db569625e4dc1ccc8c7f025228e88fcd1e72f9fa1e39728070ce_amd64", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:c1d898f5fe9d633106a2408e339492b5b72785f4206907ed6f1f85b240ef1d02_ppc64le", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:cb8edebc29a9c59a64e28ebf90b9135c4f64834d4ef348104a288ce40b68e50c_s390x", "8Base-RHACM-2.4:rhacm2/search-aggregator-rhel8@sha256:fdd78f1e68b0acddc0c96b73ecd982540aad36da113fc545ab53eda8ce73648a_amd64", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:69d47d82e20b47b7e5e71a88921ef7cddd9d1a021f064fd60718652cb70c5431_s390x", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:918b15e1a56b5ae1c7b2ed88454e0c8d764bed09aad6a7c3eba81cef12a037bc_ppc64le", "8Base-RHACM-2.4:rhacm2/search-api-rhel8@sha256:9e73404a5c51be3de470ee99e8f7607ce58b2118b0e98a96c92426136ffef0b9_amd64", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:18478faaad11689ed6cabe49794e2524fdaa5e630e1571f00156e00af9e69000_ppc64le", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:6f687bd5099e4a5102a445f334f929b984dd1870683f6bdc11422979c7aee207_s390x", "8Base-RHACM-2.4:rhacm2/search-collector-rhel8@sha256:9b42d76328a318be4997355b1c03aa9aa04e5bfacc4e025b0427fd198fcd54f2_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:44283035e2de3e8e46a0106e039de0826ca324bdb1d304f9ca548c936fc0274b_amd64", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:c61eb08f85c933c6e1cb278271ae5811b473b331e2a04deabe7c55af000e36bc_s390x", "8Base-RHACM-2.4:rhacm2/search-rhel8@sha256:df392ac34cde6de3569f677801514e09e32b89f04d8d65a6642c0b0b1983abbd_ppc64le", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:7c2413488601729fcbda649f6d63a361e8749cbcb56868f09e46f5a3ef184d38_s390x", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:e633abdcc2666f46054729c6ed5cc6e0bd0b41495759e9d8b1c239c223f13f04_amd64", "8Base-RHACM-2.4:rhacm2/search-ui-rhel8@sha256:f615394ebd71fb97d9612d43dc085f75165cfdb7217b2c4cc4d35a2714b38684_ppc64le", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:c061528e951dfc044f437da2d58accfcfd4519d8581c9b8e0d5800b95543582c_amd64", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:cb7712f80ae613e4cc2432d20533d5e2976ffad92531c68818984e44234804ca_s390x", "8Base-RHACM-2.4:rhacm2/submariner-addon-rhel8@sha256:fb36e06e93c818a4b4ec5537e8f4e3539cb1727c377f0023b64f8092d0f30be4_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:83a5a626ce8dfa974a60d231599bef4afcd40c36a683ecfde3546f381e0be99e_amd64", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:a95463ddf11f96f243a272a0c6435ce99d9be267152732d64c0d39dfb41e2845_s390x", "8Base-RHACM-2.4:rhacm2/thanos-receive-controller-rhel8@sha256:ac1420e3bc374667c5e9faea38e37ea8097c41abc22dba38fc1273e5693ce050_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:9ac8a4eaf7346e8f9d5d70fc4181b3fa9b6b45350927f69e48f4f0f30e42560c_ppc64le", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:bedc235bf03915f125f0697350f1775402cb3580688750314d3b8e450e1d1291_s390x", "8Base-RHACM-2.4:rhacm2/thanos-rhel8@sha256:d4814509b5a4e81e8ee5d275a52fc6e59a9b66aef7c3f2e965030bcf8506db12_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:70d0813f27c5b232157426d1a8104680844c7d9db2d212679108f8f363b85326_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:71b8549557dcc69abbbb53c6182a49fce073802433a0b240ba46a0509cbe798c_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rclone-rhel8@sha256:d8c4d0a9b0ae02297d861a6e1dac59521b86a518ccc3863901289425f02bdc58_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:3fa98e8bcde754c03625e2cfd659ccd4fefd8727cb31fd3fe3193fe4b6ac4bb7_amd64", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:63666af139f6fb342625a58667268de2da7cff49ba25c91efcc5d02b782e0f75_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-restic-rhel8@sha256:d94b1c432a58a4ca21e575325706779f8fc05a2535b982c7a83307c2e8228bf6_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:3dbb1f92a75c6152fa8ee79153c1f4ae05dfba1f52dd0ab499aff8921cc346a4_ppc64le", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:783c27dcf74dbbf71d01f0431cd660abcad7277a408615cd67b0bd4475f4c800_s390x", "8Base-RHACM-2.4:rhacm2/volsync-mover-rsync-rhel8@sha256:93f65f75f4ac45338cc18fec8e49b8856498327f4eea76f4dc578c948301f41c_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:471e4afd588228813fc3d6a4a24a992668d35369f74aef7dadbdfdbaabc91987_s390x", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:77d182840d099fdf26e2cf62215ead85da5752530d97ecab1ca333e276d35c88_amd64", "8Base-RHACM-2.4:rhacm2/volsync-rhel8@sha256:e8fe0406c5cef6c3c4fd2b7abc03a3840432b2f691f76349d77868f639980f9a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:0659eaee49a5e9a1819c6e124bc7fa6d84e5c47c7747ba740ec15ecd5fb6b47a_ppc64le", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:3d0dbc02c0aec6f1e1150dbdbffe83641068a2e17e811c64637b074443f110b1_amd64", "8Base-RHACM-2.4:rhacm2/work-rhel8@sha256:9e40d126f384b05b1fbe8ff5dc9906a22e78982eacb52a3a5c0126a08124514f_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "redis: Integer overflow issue with strings" } ] }
rhsa-2021_5226
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5226", "url": "https://access.redhat.com/errata/RHSA-2021:5226" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5226.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2024-11-10T18:31:41+00:00", "generator": { "date": "2024-11-10T18:31:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5226", "initial_release_date": "2021-12-21T09:45:51+00:00", "revision_history": [ { "date": "2021-12-21T09:45:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-21T09:45:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-10T18:31:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-5.el8_5.src", "product": { "name": "openssl-1:1.1.1k-5.el8_5.src", "product_id": "openssl-1:1.1.1k-5.el8_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-5.el8_5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-devel-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-devel-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-libs-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-libs-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-perl-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-perl-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product_id": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-5.el8_5?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product_id": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-5.el8_5?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-devel-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-devel-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-libs-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-libs-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-perl-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-perl-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product_id": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-5.el8_5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-devel-1:1.1.1k-5.el8_5.i686", "product": { "name": "openssl-devel-1:1.1.1k-5.el8_5.i686", "product_id": "openssl-devel-1:1.1.1k-5.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-5.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-5.el8_5.i686", "product": { "name": "openssl-libs-1:1.1.1k-5.el8_5.i686", "product_id": "openssl-libs-1:1.1.1k-5.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-5.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-5.el8_5.i686", "product": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.i686", "product_id": "openssl-debugsource-1:1.1.1k-5.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-5.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "product": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "product_id": "openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-5.el8_5?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "product_id": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-5.el8_5?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-devel-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-devel-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-libs-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-libs-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-perl-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-perl-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debugsource@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "product": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "product_id": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs-debuginfo@1.1.1k-5.el8_5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-5.el8_5.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.src" }, "product_reference": "openssl-1:1.1.1k-5.el8_5.src", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.i686" }, "product_reference": "openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.i686" }, "product_reference": "openssl-debugsource-1:1.1.1k-5.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debugsource-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-devel-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-5.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.i686" }, "product_reference": "openssl-devel-1:1.1.1k-5.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-devel-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-devel-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-libs-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-5.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.i686" }, "product_reference": "openssl-libs-1:1.1.1k-5.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-libs-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-libs-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-5.el8_5.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.aarch64" }, "product_reference": "openssl-perl-1:1.1.1k-5.el8_5.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-5.el8_5.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.ppc64le" }, "product_reference": "openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-5.el8_5.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.s390x" }, "product_reference": "openssl-perl-1:1.1.1k-5.el8_5.s390x", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.1.1k-5.el8_5.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.x86_64" }, "product_reference": "openssl-perl-1:1.1.1k-5.el8_5.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ], "organization": "Ingo Schwarze", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-08-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995634" } ], "notes": [ { "category": "description", "text": "It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read buffer overruns processing ASN.1 strings", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:\n * Red Hat Satellite\n * Red Hat Update Infrastructure\n * Red Hat CloudForms\n\nThe Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3712" }, { "category": "external", "summary": "RHBZ#1995634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20210824.txt", "url": "https://www.openssl.org/news/secadv/20210824.txt" } ], "release_date": "2021-08-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-21T09:45:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5226" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.src", "BaseOS-8.5.0.Z.MAIN:openssl-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-debugsource-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-devel-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.i686", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-libs-debuginfo-1:1.1.1k-5.el8_5.x86_64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.aarch64", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.ppc64le", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.s390x", "BaseOS-8.5.0.Z.MAIN:openssl-perl-1:1.1.1k-5.el8_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read buffer overruns processing ASN.1 strings" } ] }
gsd-2021-3712
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-3712", "description": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "id": "GSD-2021-3712", "references": [ "https://www.suse.com/security/cve/CVE-2021-3712.html", "https://www.debian.org/security/2021/dsa-4963", "https://access.redhat.com/errata/RHSA-2022:0064", "https://access.redhat.com/errata/RHSA-2021:5226", "https://access.redhat.com/errata/RHSA-2021:4618", "https://access.redhat.com/errata/RHSA-2021:4614", "https://access.redhat.com/errata/RHSA-2021:4613", "https://ubuntu.com/security/CVE-2021-3712", "https://advisories.mageia.org/CVE-2021-3712.html", "https://security.archlinux.org/CVE-2021-3712", "https://access.redhat.com/errata/RHSA-2021:4861", "https://access.redhat.com/errata/RHSA-2021:4863", "https://alas.aws.amazon.com/cve/html/CVE-2021-3712.html", "https://linux.oracle.com/cve/CVE-2021-3712.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-3712" ], "details": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "id": "GSD-2021-3712", "modified": "2023-12-13T01:23:34.893777Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "DATE_PUBLIC": "2021-08-24", "ID": "CVE-2021-3712", "STATE": "PUBLIC", "TITLE": "Read buffer overruns processing ASN.1 strings" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_value": "Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k)" }, { "version_value": "Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y)" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credit": [ { "lang": "eng", "value": "Ingo Schwarze" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y)." } ] }, "impact": [ { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", "value": "Moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20210824.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "refsource": "CONFIRM", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "name": "DSA-4963", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210827-0010/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://www.tenable.com/security/tns-2021-16", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2021-16" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://www.tenable.com/security/tns-2022-02", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2022-02" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "name": "GLSA-202209-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=1.0.2 \u003c1.0.2za||\u003e=1.1.1 \u003c1.1.1l", "affected_versions": "All versions starting from 1.0.2 before 1.0.2za, all versions starting from 1.1.1 before 1.1.1l", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-125", "CWE-937" ], "date": "2022-12-06", "description": "If a malicious actor can cause an application to directly construct an `ASN1_STRING` and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext)", "fixed_versions": [ "1.1.0l", "1.1.1o" ], "identifier": "CVE-2021-3712", "identifiers": [ "CVE-2021-3712" ], "not_impacted": "All versions before 1.0.2, all versions starting from 1.0.2za before 1.1.1, all versions starting from 1.1.1l", "package_slug": "conan/openssl", "pubdate": "2021-08-24", "solution": "Upgrade to versions 1.1.0l, 1.1.1o or above.", "title": "Out-of-bounds Read", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "https://www.openssl.org/news/secadv/20210824.txt" ], "uuid": "36e0008f-587c-4596-b1cf-3eb09fdaa54f" }, { "affected_range": "(,8.0.27]", "affected_versions": "All versions up to 8.0.27", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-125", "CWE-937" ], "date": "2022-12-06", "description": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "fixed_versions": [], "identifier": "CVE-2021-3712", "identifiers": [ "CVE-2021-3712" ], "not_impacted": "", "package_slug": "maven/mysql-connector-java", "pubdate": "2021-08-24", "solution": "Unfortunately, there is no solution available yet.", "title": "Out-of-bounds Read", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "https://www.openssl.org/news/secadv/20210824.txt", "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "https://www.debian.org/security/2021/dsa-4963", "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E", "http://www.openwall.com/lists/oss-security/2021/08/26/2", "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E", "https://security.netapp.com/advisory/ntap-20210827-0010/", "https://www.tenable.com/security/tns-2021-16", "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html", "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366", "https://www.tenable.com/security/tns-2022-02", "https://www.oracle.com/security-alerts/cpujan2022.html", "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf", "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" ], "uuid": "0cc66ded-a05a-4711-a43a-85897c71ae6b" }, { "affected_range": "\u003c=8.0.27", "affected_versions": "All versions up to 8.0.27", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-125", "CWE-937" ], "date": "2022-12-06", "description": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "fixed_versions": [ "8.0.28" ], "identifier": "CVE-2021-3712", "identifiers": [ "CVE-2021-3712" ], "not_impacted": "All versions after 8.0.27", "package_slug": "pypi/mysql-connector-python", "pubdate": "2021-08-24", "solution": "Upgrade to version 8.0.28 or above.", "title": "Out-of-bounds Read", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "https://www.openssl.org/news/secadv/20210824.txt", "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "https://www.debian.org/security/2021/dsa-4963", "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E", "http://www.openwall.com/lists/oss-security/2021/08/26/2", "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E", "https://security.netapp.com/advisory/ntap-20210827-0010/", "https://www.tenable.com/security/tns-2021-16", "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html", "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html", "https://www.oracle.com/security-alerts/cpuoct2021.html", "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366", "https://www.tenable.com/security/tns-2022-02", "https://www.oracle.com/security-alerts/cpujan2022.html", "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf", "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" ], "uuid": "b1f8793b-c77c-467f-97dd-acf0b14ea68d" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.1l", "versionStartIncluding": "1.1.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.2za", "versionStartIncluding": "1.0.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:manageability_software_development_kit:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:storage_encryption:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.50.2", "versionStartIncluding": "11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.10.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.19.1", "versionStartIncluding": "5.16.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:tenable:nessus_network_monitor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.26", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.7.35", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.26", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.25", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.3", "versionStartIncluding": "21.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.1.2.4.047", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.27", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.0.1.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_session_border_controller:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_session_border_controller:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:enterprise_communications_broker:3.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.2.6.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:health_sciences_inform_publisher:6.2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2021-3712" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20210824.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "refsource": "CONFIRM", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "refsource": "CONFIRM", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "name": "DSA-4963", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "name": "[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "name": "[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "name": "[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20210827-0010/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "name": "https://www.tenable.com/security/tns-2021-16", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "name": "[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "name": "[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366" }, { "name": "https://www.tenable.com/security/tns-2022-02", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "name": "https://www.oracle.com/security-alerts/cpujan2022.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "GLSA-202209-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "name": "GLSA-202210-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-02" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2 } }, "lastModifiedDate": "2022-12-06T21:23Z", "publishedDate": "2021-08-24T15:15Z" } } }
icsa-23-143-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Hitachi Energy", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to crash the device being accessed or cause a denial-of-service condition. ", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Switzerland", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-23-143-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-143-02.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-23-143-02 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Hitachi Energy\u0027s RTU500 Series Product (UPDATE B)", "tracking": { "current_release_date": "2023-10-19T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-143-02", "initial_release_date": "2023-05-05T06:00:00.000000Z", "revision_history": [ { "date": "2023-05-05T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" }, { "date": "2023-09-28T06:00:00.000000Z", "legacy_version": "Update A", "number": "2", "summary": "Update A - Update to Mitigations and Affected Products" }, { "date": "2023-10-19T06:00:00.000000Z", "legacy_version": "Update B", "number": "3", "summary": "Update B - Update to Mitigations and Affected Products" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=12.0.1|\u003c=12.0.15", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.0.1|\u003c=12.0.15", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.2.1|\u003c=12.2.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.2.1|\u003c=12.2.12", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.4.1|\u003c=12.4.12", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.4.1|\u003c=12.4.12", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.6.1|\u003c=12.6.9", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.6.1|\u003c=12.6.9", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=12.7.1|\u003c=12.7.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=12.7.1|\u003c=12.7.6", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.2.1|\u003c=13.2.6", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.2.1|\u003c=13.2.6", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.3.1|\u003c=13.3.3", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.3.1|\u003c=13.3.3", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=13.4.1|\u003c=13.4.2", "product": { "name": "RTU500 series CMU Firmware: \u003e=13.4.1|\u003c=13.4.2", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "RTU500 series CMU Firmware" } ], "category": "vendor", "name": "Hitachi Energy" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "There is a type-confusion vulnerability affecting X.400 address processing within an X.509 GeneralName. This vulnerability could allow an attacker to pass arbitrary pointers to a memcmp call, enabling access to read memory contents or cause a denial-of-service condition.X.400 addresses parsed as an ASN1_STRING while the public structure definition for GENERAL_NAME incorrectly specifies the x400Address field type as ASN1_TYPE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0286" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 \ufffd 12.0.15, 12.2.1 \ufffd 12.2.12, 12.4.1 \ufffd 12.4.12, 12.6.1 \ufffd 12.6.9, 12.7.1 \ufffd 12.7.6, 13.2.1 \ufffd 13.2.6, 13.3.1 \ufffd 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing-based side channel exists in the OpenSSL RSA Decryption implementation. This could allow an attacker sufficient access to recover plaintext across a network to perform a Bleichenbacher style attack. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "Until the updates are made available, Hitachi Energy recommends the following general mitigation factors/workarounds for the products with RTU500 series CMU Firmware versions 12.0.1 - 12.0.15, 12.2.1 - 12.2.12, 12.4.1 - 12.4.12, 12.6.1 - 12.6.9, 12.7.1 - 12.7.6, 13.2.1 - 13.2.6, 13.3.1 - 13.3.3, 13.4.2 to address the vulnerabilities CVE-2023-0286 and CVE-2022-4304:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-23937", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the Wind River VxWorks version 6.9 affecting the RTU500 series product versions listed. An attacker could exploit the vulnerability by using a specific crafted packet that could lead to an out-of-bounds read during an IKE initial exchange scenario. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-23937" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2022-0778", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL version 1.0.2 that affects the RTU500 Series product versions listed. An attacker can exploit the BN_mod_sqrt() function to compute a modular square root that contains a bug causing a continual loop for non-prime moduli. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0778" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 \ufffd 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 \ufffd 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 \ufffd 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 \ufffd 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 \ufffd 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 \ufffd 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 \ufffd 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. An attacker with access to applications and the capability to present SM2 content for decryption could cause a buffer overflow up to a maximum of 62 bytes while altering contents of data present after the buffer. This vulnerability could allow an attacker to change application behavior or cause the application to crash.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3711" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A vulnerability exists in the OpenSSL Version 1.0.2 affecting the RTU500 Series product versions listed. A malicious actor could cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions. Exploiting this vulnerability could create a system crash causing a denial-of-service condition or a disclosure of private memory contents, such as private keys or sensitive plaintext. ", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3712" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Hitachi Energy has released the following mitigations/fixes for CVE-2022-23937, CVE-2022-0778, CVE-2021-3711, and CVE-2021-3712:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.0.1 - 12.0.14: Update to CMU Firmware version 12.0.15* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.2.1 - 12.2.11: Update to CMU Firmware version 12.2.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.4.1 - 12.4.11: Update to CMU Firmware version 12.4.12* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.6.1 - 12.6.8: Update to CMU Firmware version 12.6.9", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 12.7.1 - 12.7.5: Update to CMU Firmware version 12.7.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.2.1 - 13.2.5: Update to CMU Firmware version 13.2.6", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.3.1 - 13.3.3: Update to CMU Firmware version 13.3.4* (Planned Update)", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "vendor_fix", "details": "RTU500 series CMU Firmware version 13.4.1: Update to CMU Firmware version 13.4.2", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Recommended security practices and firewall configurations can help protect a process control network from attacks originating from outside the network including.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Physically protect process control systems from direct access by unauthorized personnel.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Do not allow process control systems direct connections to the internet.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Separate process control systems from other networks by means of a firewall system that has a minimal number of ports exposed.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Process control systems should not be used for internet surfing, instant messaging, or receiving emails.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "For more information, see Hitachi Energy\u0027s Security Advisories:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] }, { "category": "mitigation", "details": "8DBD000150", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000150\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "mitigation", "details": "8DBD000153", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008" ] } ] } ] }
icsa-22-069-09
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways.", "title": "Risk evaluation" }, { "category": "other", "text": "Energy", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-389290.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-069-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-069-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "category": "external", "summary": "SSA-389290: Third-Party Component Vulnerabilities in SINEC INS - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-389290.txt" } ], "title": "Siemens SINEC INS", "tracking": { "current_release_date": "2022-03-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-069-09", "initial_release_date": "2022-03-10T00:00:00.000000Z", "revision_history": [ { "date": "2022-03-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-069-09 Siemens SINEC INS" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.0.1.1", "product": { "name": "SINEC INS", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SINEC INS" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19242", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19242 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19242 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19242.json" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19242" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19244" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19317" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19603" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19645" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19646" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19880" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8169" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8177" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8265" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8284" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8287" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8625" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9327" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11655" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11656" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13630" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13631" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13632" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13871" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15358" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22883" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22884" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22897" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22898" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22901" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22918" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22921" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22922" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22923" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22925" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22926" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22930" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22931" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22939" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22940" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22946" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22947" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23362" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25214" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25215" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25216" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25219" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27290" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37701" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37712" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37713" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39134" }, { "category": "external", "summary": "nvd.nist.gov", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39135" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19242" }, { "cve": "CVE-2019-19244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19244 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19244 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19244.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19317", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19317 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19317.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19603", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19603 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19603 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19603.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19645", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19645 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19645 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19645.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19646", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19646 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19646 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19646.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19880", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19880 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19880 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19880.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19923", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19924", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19925", "cwe": { "id": "CWE-434", "name": "Unrestricted Upload of File with Dangerous Type" }, "notes": [ { "category": "summary", "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19926", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2019-19926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2019-19926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-19926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2019-19926" }, { "cve": "CVE-2020-1971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL\u0027s s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL\u0027s parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-1971 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-1971 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-1971.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-1971" }, { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "notes": [ { "category": "summary", "text": "This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require(\u0027y18n\u0027)(); y18n.setLocale(\u0027PROTO\u0027); y18n.updateLocale({polluted: true}); console.log(polluted); // true", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-7774 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-7774 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-7774.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-7774" }, { "cve": "CVE-2020-8169", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.62.0 to and including 7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8169 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8169 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8169.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8177 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8177 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8177.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8231 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8231 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8231.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8265", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8265 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8265 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8265.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8265" }, { "cve": "CVE-2020-8284", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8284 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8284 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8284.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "summary", "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8285 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8285 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8285.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The libcurl library versions 7.41.0 to and including 7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8286 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8286 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8286.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8287", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8287 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8287 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8287.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8287" }, { "cve": "CVE-2020-8625", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -\u003e 9.11.27, 9.12.0 -\u003e 9.16.11, and versions BIND 9.11.3-S1 -\u003e 9.11.27-S1 and 9.16.8-S1 -\u003e 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-8625 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-8625 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-8625.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-8625" }, { "cve": "CVE-2020-9327", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-9327 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-9327 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-9327.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-9327" }, { "cve": "CVE-2020-11655", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11655 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11655 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11655.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11655" }, { "cve": "CVE-2020-11656", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-11656 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-11656 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-11656.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-11656" }, { "cve": "CVE-2020-13630", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13630 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13630 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13630.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13631", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13631 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13631 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13631.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13632", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13632 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13632 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13632.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13871", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-13871 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-13871 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-13871.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-13871" }, { "cve": "CVE-2020-15358", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-15358 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-15358 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-15358.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-15358" }, { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-3449", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3449 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3449 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3449.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a \"purpose\" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named \"purpose\" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3450 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3450 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3450.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3672", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3672 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3672 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3672.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3672" }, { "cve": "CVE-2021-3711", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the \"out\" parameter can be NULL and, on exit, the \"outlen\" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the \"out\" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3711 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3711 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3711.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-3712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-3712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-3712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-3712" }, { "cve": "CVE-2021-22876", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22876 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22876 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22876.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22883", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an \u0027unknownProtocol\u0027 are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22883 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22883 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22883.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22883" }, { "cve": "CVE-2021-22884", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes \u201clocalhost6\u201d. When \u201clocalhost6\u201d is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim\u0027s DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the \u201clocalhost6\u201d domain. As long as the attacker uses the \u201clocalhost6\u201d domain, they can still apply the attack described in CVE-2018-7160.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22884 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22884 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22884.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22884" }, { "cve": "CVE-2021-22890", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22890 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22890 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22890.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22897 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22897 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22897.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "curl 7.7 through 7.76.1 suffers from an information disclosure when the -t command line option, known as CURLOPT_TELNETOPTIONS in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22898 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22898 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22898.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22901 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22901 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22901.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22918", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22918 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22918 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22918.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22918" }, { "cve": "CVE-2021-22921", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22921 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22921 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22921.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22921" }, { "cve": "CVE-2021-22922", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22922 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22922 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22922.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22923 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22923 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22923.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "cwe": { "id": "CWE-706", "name": "Use of Incorrectly-Resolved Name or Reference" }, "notes": [ { "category": "summary", "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths _case insensitively_,which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22924 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22924 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22924.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "curl supports the -t command line option, known as CURLOPT_TELNETOPTIONSin libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending NEW_ENV variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22925 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22925 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22925.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the CURLOPT_SSLCERT option (--cert with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like /tmp), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22926 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22926 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22926.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22930", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22930 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22930 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22930.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22930" }, { "cve": "CVE-2021-22931", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22931 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22931 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22931.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22931" }, { "cve": "CVE-2021-22939", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "If the Node.js https API was used incorrectly and \"undefined\" was in passed for the \"rejectUnauthorized\" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22939 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22939 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22939.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22939" }, { "cve": "CVE-2021-22940", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22940 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22940 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22940.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22940" }, { "cve": "CVE-2021-22945", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it _again_.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22945 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22945 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22945.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "cwe": { "id": "CWE-319", "name": "Cleartext Transmission of Sensitive Information" }, "notes": [ { "category": "summary", "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (--ssl-reqd on the command line orCURLOPT_USE_SSL set to CURLUSESSL_CONTROL or CURLUSESSL_ALL withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations WITHOUTTLS contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22946 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22946 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22946.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got _before_ the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-22947 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-22947 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-22947.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23362", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23362 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23362 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23362.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23362" }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-23840 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-23840 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-23840.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-23840" }, { "cve": "CVE-2021-25214", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.8.5 -\u003e 9.8.8, 9.9.3 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25214 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25214 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25214.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25214" }, { "cve": "CVE-2021-25215", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.0.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.9.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25215 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25215 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25215.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25215" }, { "cve": "CVE-2021-25216", "cwe": { "id": "CWE-617", "name": "Reachable Assertion" }, "notes": [ { "category": "summary", "text": "In BIND 9.5.0 -\u003e 9.11.29, 9.12.0 -\u003e 9.16.13, and versions BIND 9.11.3-S1 -\u003e 9.11.29-S1 and 9.16.8-S1 -\u003e 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND\u0027s default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25216 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25216 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25216.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25216" }, { "cve": "CVE-2021-25219", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In BIND 9.3.0 -\u003e 9.11.35, 9.12.0 -\u003e 9.16.21, and versions 9.9.3-S1 -\u003e 9.11.35-S1 and 9.16.8-S1 -\u003e 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -\u003e 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-25219 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-25219 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25219.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-25219" }, { "cve": "CVE-2021-27290", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-27290 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-27290 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-27290.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-27290" }, { "cve": "CVE-2021-32803", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the node-tar directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where node-tar checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32803 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32803 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32803.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32803" }, { "cve": "CVE-2021-32804", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the preservePaths flag is not set to true. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example /home/user/.bashrc would turn into home/user/.bashrc. This logic was insufficient when file paths contained repeated path roots such as ////home/user/.bashrc. node-tar would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. ///home/user/.bashrc) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom onentry method which sanitizes the entry.path or a filter method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-32804 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-32804 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-32804.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-32804" }, { "cve": "CVE-2021-37701", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.16, 5.0.8, and 6.1.7 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both \\ and / characters as path separators, however \\ is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at FOO, followed by a symbolic link named foo, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the FOO directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-9r2w-394v-53qc.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37701 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37701 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37701.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37701" }, { "cve": "CVE-2021-37712", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 \"short path\" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37712 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37712 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37712.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37712" }, { "cve": "CVE-2021-37713", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The npm package \"tar\" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be outside of the extraction target directory is not extracted. This is, in part, accomplished by sanitizing absolute paths of entries within the archive, skipping archive entries that contain .. path portions, and resolving the sanitized paths against the extraction target directory. This logic was insufficient on Windows systems when extracting tar files that contained a path that was not an absolute path, but specified a drive letter different from the extraction target, such as C:some\\path. If the drive letter does not match the extraction target, for example D:\\extraction\\dir, then the result of path.resolve(extractionDirectory, entryPath) would resolve against the current working directory on the C: drive, rather than the extraction target directory. Additionally, a .. portion of the path could occur immediately after the drive letter, such as C:../foo, and was not properly sanitized by the logic that checked for .. within the normalized and split portions of the path. This only affects users of node-tar on Windows systems. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. There is no reasonable way to work around this issue without performing the same path normalization procedures that node-tar now does. Users are encouraged to upgrade to the latest patched versions of node-tar, rather than attempt to sanitize paths themselves.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-37713 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-37713 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-37713.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-37713" }, { "cve": "CVE-2021-39134", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in package.json manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist\u0027s internal data structure saw them as separate items that could coexist within the same level in the node_modules hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as file:/some/path, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package pwn-a could define a dependency in their package.json file such as \"foo\": \"file:/some/path\". Another package, pwn-b could define a dependency such as FOO: \"file:foo.tgz\". On case-insensitive file systems, if pwn-a was installed, and then pwn-b was installed afterwards, the contents of foo.tgz would be written to /some/path, and any existing contents of /some/path would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39134 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39134 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39134.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39134" }, { "cve": "CVE-2021-39135", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "summary", "text": "@npmcli/arborist, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project\u0027s node_modules folder. If the node_modules folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a node_modules symbolic link would have to be employed. 1. A preinstall script could replace node_modules with a symlink. (This is prevented by using --ignore-scripts.) 2. An attacker could supply the target with a git repository, instructing them to run npm install --ignore-scripts in the root. This may be successful, because npm install --ignore-scripts is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist 2.8.2 which is included in npm v7.20.7 and above. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39135 - SINEC INS", "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "summary": "CVE-2021-39135 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39135.json" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.0.1.1 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109806100/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39135" } ] }
icsa-22-130-06
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Mitsubishi Electric", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow a remote attacker to send specially crafted messages, resulting in information disclosure or a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-22-130-06 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-130-06.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-130-06 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-130-06" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Mitsubishi Electric MELSOFT GT OPC UA", "tracking": { "current_release_date": "2022-05-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-130-06", "initial_release_date": "2022-05-10T00:00:00.000000Z", "revision_history": [ { "date": "2022-05-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-130-06 Mitsubishi Electric MELSOFT GT OPC UA" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.215Z | \u003c= 1.270G", "product": { "name": "GT SoftGOT2000: Versions 1.215Z to 1.270G", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "GT SoftGOT2000" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.00A | \u003c= 1.02C", "product": { "name": "MELSOFT GT OPC UA Client: Versions 1.00A to 1.02C", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "MELSOFT GT OPC UA Client" } ], "category": "vendor", "name": "Mitsubishi Electric" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3712", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to an out-of-bounds read, which may allow an attacker to send specially crafted messages to disclose information on memory or cause a denial-of-service condition.CVE-2021-3712 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3712" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Mitsubishi Electric recommends users update software", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.mitsubishielectric.com/fa/support/index.html" }, { "category": "vendor_fix", "details": "Update MELSOFT GT OPC UA Client: Update to 1.03D or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Update GT SoftGOT2000: Update to 1.275M or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "When connecting the products to the Internet, use a virtual private network (VPN, etc.) to prevent spoofing and sniffing.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Use the products within the LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Update the OPC UA server to the latest version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Install antivirus software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Restrict physical access to computers and network equipment that use the affected products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] }, { "cve": "CVE-2021-23840", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The affected product is vulnerable due to an integer overflow, which may allow an attacker to cause a denial-of-service condition.CVE-2021-23840 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-23840" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Mitsubishi Electric recommends users update software", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://www.mitsubishielectric.com/fa/support/index.html" }, { "category": "vendor_fix", "details": "Update MELSOFT GT OPC UA Client: Update to 1.03D or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Update GT SoftGOT2000: Update to 1.275M or later", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "When connecting the products to the Internet, use a virtual private network (VPN, etc.) to prevent spoofing and sniffing.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Use the products within the LAN and block access from untrusted networks and hosts.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Update the OPC UA server to the latest version.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Install antivirus software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "Restrict physical access to computers and network equipment that use the affected products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ] } ] }
wid-sec-w-2024-1186
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM DB2 REST ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1186 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1186.json" }, { "category": "self", "summary": "WID-SEC-2024-1186 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1186" }, { "category": "external", "summary": "IBM Security Bulletin - 7154484 vom 2024-05-20", "url": "https://www.ibm.com/support/pages/node/7154484" } ], "source_lang": "en-US", "title": "IBM DB2 REST: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-20T22:00:00.000+00:00", "generator": { "date": "2024-05-21T10:06:00.707+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-1186", "initial_release_date": "2024-05-20T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "REST \u003c1.0.0.304-amd64", "product": { "name": "IBM DB2 REST \u003c1.0.0.304-amd64", "product_id": "T034928", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:rest__1.0.0.304-amd64" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19126", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2019-19126" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-10029" }, { "cve": "CVE-2020-1751", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1751" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2020-1752" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-4160", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2021-4160" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM DB2 REST. Diese Fehler bestehen in den Komponenten GNU libc, OpenSSL und OpenSSH. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-05-20T22:00:00Z", "title": "CVE-2023-48795" } ] }
wid-sec-w-2022-0400
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- F5 Networks\n- Hardware Appliance\n- Linux\n- MacOS X\n- NetApp Appliance\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0400 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0400.json" }, { "category": "self", "summary": "WID-SEC-2022-0400 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0400" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2021-08-24", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "category": "external", "summary": "Debian Security Advisory vom 2021-08-24", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "category": "external", "summary": "Ubuntu Security Notice vom 2021-08-24", "url": "https://ubuntu.com/security/notices/USN-5051-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2825-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2830-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2831-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14791-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-21:16.OPENSSL vom 2021-08-24", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:16.openssl.asc" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2833-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2826-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2827-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2829-1 vom 2021-08-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-21:16.OPENSSL vom 2021-08-24", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-21:16.openssl.asc" }, { "category": "external", "summary": "Synology Security Advisory SYNOLOGY-SA-21:24 vom 2021-08-26", "url": "https://www.synology.com/en-global/support/security/Synology_SA_21_24" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-2 vom 2021-08-26", "url": "https://ubuntu.com/security/notices/USN-5051-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-3 vom 2021-08-26", "url": "https://ubuntu.com/security/notices/USN-5051-3" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20210827-0010 vom 2021-08-27", "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2852-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-39 vom 2021-08-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-39" }, { "category": "external", "summary": "QNAP Security Advisory QSA-21-40 vom 2021-08-30", "url": "https://www.qnap.com/de-de/security-advisory/QSA-21-40" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5051-4 vom 2021-09-01", "url": "https://ubuntu.com/security/notices/USN-5051-4" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2966-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2967-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2968-1 vom 2021-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2996-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2995-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2994-1 vom 2021-09-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3019-1 vom 2021-09-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1721 vom 2021-11-04", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1721.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14801-1 vom 2021-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14802-1 vom 2021-09-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3144-1 vom 2021-09-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2966-2 vom 2021-09-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5088-1 vom 2021-09-23", "url": "https://ubuntu.com/security/notices/USN-5088-1" }, { "category": "external", "summary": "F5 Security Advisory K19559038 vom 2021-10-01", "url": "https://support.f5.com/csp/article/K19559038" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1541 vom 2021-10-05", "url": "https://alas.aws.amazon.com/ALAS-2021-1541.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2021-1714 vom 2021-10-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1714.html" }, { "category": "external", "summary": "HPE Security Bulletin HPESBNS04202 vom 2021-10-07", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbns04202en_us" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4614 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:4613 vom 2021-11-10", "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "category": "external", "summary": "Meinberg Security Advisory MBGSA-2021.03 vom 2021-11-15", "url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2021-03-meinberg-lantime-firmware-v7-04-008-und-v6-24-029.htm" }, { "category": "external", "summary": "IBM Security Bulletin 6526078 vom 2021-12-15", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-openssl-affect-ibm-integration-bus-cve-2021-3712/" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04211en_us" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:5226 vom 2021-12-21", "url": "https://access.redhat.com/errata/RHSA-2021:5226" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-5226 vom 2021-12-22", "url": "http://linux.oracle.com/errata/ELSA-2021-5226.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9632 vom 2021-12-23", "url": "https://linux.oracle.com/errata/ELSA-2021-9632.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0015 vom 2022-01-04", "url": "https://access.redhat.com/errata/RHSA-2022:0015" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-02 vom 2022-01-06", "url": "https://de.tenable.com/security/tns-2022-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0034 vom 2022-01-05", "url": "https://access.redhat.com/errata/RHSA-2022:0034" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0043 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0043" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0042 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0042" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0044 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0044" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0047 vom 2022-01-10", "url": "https://access.redhat.com/errata/RHSA-2022:0047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0064 vom 2022-01-11", "url": "https://access.redhat.com/errata/RHSA-2022:0064" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-0064 vom 2022-01-12", "url": "http://linux.oracle.com/errata/ELSA-2022-0064.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9017 vom 2022-01-13", "url": "https://linux.oracle.com/errata/ELSA-2022-9017.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9023 vom 2022-01-14", "url": "https://linux.oracle.com/errata/ELSA-2022-9023.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0163 vom 2022-01-18", "url": "https://access.redhat.com/errata/RHSA-2022:0163" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-004 vom 2022-01-19", "url": "https://downloads.avaya.com/css/P8/documents/101079950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0318 vom 2022-01-27", "url": "https://access.redhat.com/errata/RHSA-2022:0318" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2134-1 vom 2022-06-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0434 vom 2022-02-04", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0431 vom 2022-02-03", "url": "https://access.redhat.com/errata/RHSA-2022:0431" }, { "category": "external", "summary": "SIEMENS Security Advisory SSA-244969 vom 2022-02-08", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0476 vom 2022-02-09", "url": "https://access.redhat.com/errata/RHSA-2022:0476" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?elq_mid=17739\u0026elq_cid=67018031\u0026docId=hpesbhf04251en_us" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-002 vom 2022-02-03", "url": "https://downloads.avaya.com/css/P8/documents/101080403" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:0751-1 vom 2022-03-08", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0856 vom 2022-03-14", "url": "https://access.redhat.com/errata/RHSA-2022:0856" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04309en_us\u0026hprpt_id=ALERT_HPE_3024068\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9225 vom 2022-03-18", "url": "https://linux.oracle.com/errata/ELSA-2022-9225.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1051 vom 2022-03-24", "url": "https://access.redhat.com/errata/RHSA-2022:1051" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:0577 vom 2022-03-28", "url": "https://access.redhat.com/errata/RHSA-2022:0577" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1396-1 vom 2022-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10", "url": "http://www.auscert.org.au/bulletins/ESB-2022.2191" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2022-10 vom 2022-05-10 vom 2022-05-09", "url": "https://www.tenable.com/security/tns-2022-10" }, { "category": "external", "summary": "HPE SECURITY BULLETIN HPESBST04367 rev.1 vom 2022-09-21", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-hpesbst04367en_us" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202210-02 vom 2022-10-16", "url": "https://security.gentoo.org/glsa/202210-02" }, { "category": "external", "summary": "Trellix Knowledge Center", "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10366" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4428-1 vom 2022-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" }, { "category": "external", "summary": "Hitachi Cybersecurity Advisory vom 2023-04-25", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-126 vom 2023-07-18", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-126/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" }, { "category": "external", "summary": "Hitachi Energy Cybersecurity Advisory vom 2023-08-29", "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000153-CSAF\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "category": "external", "summary": "F5 Security Advisory K19559038 vom 2023-10-12", "url": "https://my.f5.com/manage/s/article/K19559038" }, { "category": "external", "summary": "IBM Security Bulletin 7063708 vom 2023-10-31", "url": "https://www.ibm.com/support/pages/node/7063708" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0191-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32790 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32790.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13026 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13026.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13027 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13027.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13024 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13024.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-13025 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-13025.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-32791 vom 2023-12-07", "url": "https://linux.oracle.com/errata/ELSA-2023-32791.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2502 vom 2024-03-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2502.html" }, { "category": "external", "summary": "SolarWinds Platform 2024.2 release notes vom 2024-06-04", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-2_release_notes.htm" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12408 vom 2024-06-05", "url": "https://linux.oracle.com/errata/ELSA-2024-12408.html" } ], "source_lang": "en-US", "title": "OpenSSL: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2024-06-04T22:00:00.000+00:00", "generator": { "date": "2024-06-05T08:09:03.538+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0400", "initial_release_date": "2021-08-24T22:00:00.000+00:00", "revision_history": [ { "date": "2021-08-24T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2021-08-25T22:00:00.000+00:00", "number": "2", "summary": "Neue Informationen von Synology aufgenommen" }, { "date": "2021-08-26T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-01T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-09-07T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-13T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-19T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-20T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-09-23T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-10-03T22:00:00.000+00:00", "number": "13", "summary": "Neue Informationen von F5 aufgenommen" }, { "date": "2021-10-04T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-10-06T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-10-07T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-11-04T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2021-11-10T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-11-14T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Meinberg aufgenommen" }, { "date": "2021-12-14T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2021-12-15T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2021-12-21T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2021-12-23T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-04T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-05T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Tenable und Red Hat aufgenommen" }, { "date": "2022-01-09T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-10T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-11T23:00:00.000+00:00", "number": "28", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-01-12T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-13T23:00:00.000+00:00", "number": "30", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-01-18T23:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-01-27T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von AVAYA und Red Hat aufgenommen" }, { "date": "2022-02-03T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-07T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Siemens aufgenommen" }, { "date": "2022-02-08T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-02-17T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-03-02T23:00:00.000+00:00", "number": "37", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-03-08T23:00:00.000+00:00", "number": "38", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-14T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-20T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-03-24T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-03-28T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-04-25T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-05-09T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Tenable aufgenommen" }, { "date": "2022-05-22T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-06-20T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-20T22:00:00.000+00:00", "number": "47", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates aufgenommen" }, { "date": "2022-12-12T23:00:00.000+00:00", "number": "50", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-23T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates aufgenommen" }, { "date": "2023-07-17T22:00:00.000+00:00", "number": "52", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2023-07-18T22:00:00.000+00:00", "number": "53", "summary": "Hitachi Produkte erg\u00e4nzt." }, { "date": "2023-08-28T22:00:00.000+00:00", "number": "54", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-11T22:00:00.000+00:00", "number": "55", "summary": "Neue Updates aufgenommen" }, { "date": "2023-10-31T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-12-07T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-18T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-03T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates aufgenommen" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "63" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Web License Manager", "product": { "name": "Avaya Web License Manager", "product_id": "T016243", "product_identification_helper": { "cpe": "cpe:/a:avaya:web_license_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c19.10", "product": { "name": "Dell NetWorker \u003c19.10", "product_id": "T032354", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "product_name", "name": "NetWorker" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } }, { "category": "product_version_range", "name": "\u003c16.1.3.1", "product": { "name": "F5 BIG-IP \u003c16.1.3.1", "product_id": "T025082", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:16.1.3.1" } } }, { "category": "product_version_range", "name": "\u003c15.1.6.1", "product": { "name": "F5 BIG-IP \u003c15.1.6.1", "product_id": "T025089", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:15.1.6.1" } } }, { "category": "product_version_range", "name": "\u003c17.0.0", "product": { "name": "F5 BIG-IP \u003c17.0.0", "product_id": "T025350", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:17.0.0" } } } ], "category": "product_name", "name": "BIG-IP" } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HPE Fabric OS", "product": { "name": "HPE Fabric OS", "product_id": "T019403", "product_identification_helper": { "cpe": "cpe:/o:hpe:fabric_os:-" } } }, { "category": "product_name", "name": "HPE HP-UX", "product": { "name": "HPE HP-UX", "product_id": "4871", "product_identification_helper": { "cpe": "cpe:/o:hp:hp-ux:-" } } }, { "category": "product_name", "name": "HPE NonStop Server", "product": { "name": "HPE NonStop Server", "product_id": "4918", "product_identification_helper": { "cpe": "cpe:/h:hp:nonstop_server:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Hitachi Energy RTU500", "product": { "name": "Hitachi Energy RTU500", "product_id": "T027844", "product_identification_helper": { "cpe": "cpe:/h:abb:rtu500:-" } } } ], "category": "vendor", "name": "Hitachi Energy" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.24", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.24", "product_id": "T030689", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.24" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "10.0.0.0-10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0-10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.04.008", "product": { "name": "Meinberg LANTIME \u003c7.04.008", "product_id": "T021044", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:7.04.008" } } }, { "category": "product_version_range", "name": "\u003c6.24.029", "product": { "name": "Meinberg LANTIME \u003c6.24.029", "product_id": "T021045", "product_identification_helper": { "cpe": "cpe:/h:meinberg:lantime:6.24.029" } } } ], "category": "product_name", "name": "LANTIME" } ], "category": "vendor", "name": "Meinberg" }, { "branches": [ { "category": "product_name", "name": "NetApp Data ONTAP", "product": { "name": "NetApp Data ONTAP", "product_id": "7654", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.1.1", "product": { "name": "Open Source OpenSSL \u003c1.1.1", "product_id": "402226", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1" } } }, { "category": "product_version_range", "name": "\u003c1.1.1l", "product": { "name": "Open Source OpenSSL \u003c1.1.1l", "product_id": "T020216", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1l" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "QNAP NAS", "product": { "name": "QNAP NAS", "product_id": "T017100", "product_identification_helper": { "cpe": "cpe:/h:qnap:nas:-" } } } ], "category": "vendor", "name": "QNAP" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "1200", "product": { "name": "Siemens SIMATIC S7 1200", "product_id": "T019435", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1200" } } } ], "category": "product_name", "name": "SIMATIC S7" } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2024.2", "product": { "name": "SolarWinds Platform \u003c2024.2", "product_id": "T035149", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2024.2" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "category": "product_name", "name": "Synology DiskStation Manager", "product": { "name": "Synology DiskStation Manager", "product_id": "450918", "product_identification_helper": { "cpe": "cpe:/a:synology:diskstation_manager:-" } } } ], "category": "vendor", "name": "Synology" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus Network Monitor", "product": { "name": "Tenable Security Nessus Network Monitor", "product_id": "T016632", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:-" } } }, { "category": "product_version_range", "name": "\u003c6.0.1", "product": { "name": "Tenable Security Nessus Network Monitor \u003c6.0.1", "product_id": "T023141", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.0.1" } } } ], "category": "product_name", "name": "Nessus Network Monitor" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c5.10 CU 11", "product": { "name": "Trellix ePolicy Orchestrator \u003c5.10 CU 11", "product_id": "T024888", "product_identification_helper": { "cpe": "cpe:/a:trellix:epolicy_orchestrator:5.10_update_14" } } } ], "category": "product_name", "name": "ePolicy Orchestrator" } ], "category": "vendor", "name": "Trellix" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In OpenSSL existieren mehrere Schwachstellen. Die Schwachstellen treten bei der Verarbeitung von ASN.1-Strings und dem Entschl\u00fcsseln von SM2-Daten auf. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T025350", "T031895", "67646", "4035", "4871", "T010951", "T030689", "T015127", "T015126", "T016632", "T004914", "450918", "T019435", "T020304", "T024888", "T001663", "398363", "T015519", "T015518", "T035149", "T015516", "T025082", "7654", "T012167", "T032354", "T016243", "T017100", "T017562", "T019403", "4918", "2951", "T002207", "T000126", "T027844", "T025089" ] }, "release_date": "2021-08-24T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In OpenSSL existieren mehrere Schwachstellen. Die Schwachstellen treten bei der Verarbeitung von ASN.1-Strings und dem Entschl\u00fcsseln von SM2-Daten auf. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T025350", "T031895", "67646", "4035", "4871", "T010951", "T030689", "T015127", "T015126", "T016632", "T004914", "450918", "T019435", "T020304", "T024888", "T001663", "398363", "T015519", "T015518", "T035149", "T015516", "T025082", "7654", "T012167", "T032354", "T016243", "T017100", "T017562", "T019403", "4918", "2951", "T002207", "T000126", "T027844", "T025089" ] }, "release_date": "2021-08-24T22:00:00Z", "title": "CVE-2021-3712" } ] }
wid-sec-w-2022-0602
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Security Verify Access, ehemals IBM Security Access Manager (ISAM), ist eine Zugriffsverwaltungsl\u00f6sung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM Security Verify Access ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0602 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0602.json" }, { "category": "self", "summary": "WID-SEC-2022-0602 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0602" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601725" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601729" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601731" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-07-06", "url": "https://www.ibm.com/support/pages/node/6601733" }, { "category": "external", "summary": "IBM Security Bulletin 7108821 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108821" } ], "source_lang": "en-US", "title": "IBM Security Verify Access: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:52:22.007+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0602", "initial_release_date": "2022-07-06T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Security Verify Access 10.0.0", "product": { "name": "IBM Security Verify Access 10.0.0", "product_id": "822913", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access Docker 10.0.0", "product": { "name": "IBM Security Verify Access Docker 10.0.0", "product_id": "T019827", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:docker_container__10.0.2.0" } } }, { "category": "product_name", "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product": { "name": "IBM Security Verify Access 10.0.0.0 - 10.0.6.1", "product_id": "T031895", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1" } } } ], "category": "product_name", "name": "Security Verify Access" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-1323", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1323" }, { "cve": "CVE-2010-1324", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-1324" }, { "cve": "CVE-2010-4020", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4020" }, { "cve": "CVE-2010-4021", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2010-4021" }, { "cve": "CVE-2017-11692", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2017-11692" }, { "cve": "CVE-2018-20217", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20217" }, { "cve": "CVE-2018-20573", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20573" }, { "cve": "CVE-2018-20574", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-20574" }, { "cve": "CVE-2018-5730", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2018-5730" }, { "cve": "CVE-2019-6285", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2019-6285" }, { "cve": "CVE-2020-28196", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2020-28196" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2022-22370", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22370" }, { "cve": "CVE-2022-22463", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22463" }, { "cve": "CVE-2022-22464", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22464" }, { "cve": "CVE-2022-22465", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-22465" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In IBM Security Verify Access existieren mehrere Schwachstellen. Neben dem Programm sind auch die folgenden Komponenten betroffen: Manager Appliance, libxml2, OpenSSL, yaml-cpp, MIT Kerberos, MIT krb5 und FasterXML jackson-databind. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer oder ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstellen ausnutzen, um einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Informationen zu manipulieren, einen Denial-of-Service-Zustand zu verursachen und Sicherheitsma\u00dfnahmen zu umgehen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T031895", "822913", "T019827" ] }, "release_date": "2022-07-06T22:00:00Z", "title": "CVE-2022-23308" } ] }
wid-sec-w-2023-0530
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "ArubaOS ist das Betriebssystem der Aruba Netzwerkprodukte.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Aruba ArubaOS ausnutzen, um seine Privilegien zu erh\u00f6hen, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0530 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0530.json" }, { "category": "self", "summary": "WID-SEC-2023-0530 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0530" }, { "category": "external", "summary": "Aruba Product Security Advisory vom 2023-02-28", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt" }, { "category": "external", "summary": "Aruba Product Security Advisory vom 2023-02-28", "url": "https://www.arubanetworks.com/security-advisory/arubaos-multiple-vulnerabilities-7/" } ], "source_lang": "en-US", "title": "Aruba ArubaOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-02-28T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:17:31.026+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0530", "initial_release_date": "2023-02-28T23:00:00.000+00:00", "revision_history": [ { "date": "2023-02-28T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Aruba ArubaOS \u003c 10.3.1.1", "product": { "name": "Aruba ArubaOS \u003c 10.3.1.1", "product_id": "1241958", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:10.3.1.1" } } }, { "category": "product_name", "name": "Aruba ArubaOS \u003c 8.10.0.5", "product": { "name": "Aruba ArubaOS \u003c 8.10.0.5", "product_id": "T026576", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:8.10.0.5" } } }, { "category": "product_name", "name": "Aruba ArubaOS \u003c 8.11.0.0", "product": { "name": "Aruba ArubaOS \u003c 8.11.0.0", "product_id": "T026577", "product_identification_helper": { "cpe": "cpe:/o:arubanetworks:arubaos:8.11.0.0" } } } ], "category": "product_name", "name": "ArubaOS" } ], "category": "vendor", "name": "Aruba" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22778", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22778" }, { "cve": "CVE-2023-22777", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22777" }, { "cve": "CVE-2023-22776", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22776" }, { "cve": "CVE-2023-22775", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22775" }, { "cve": "CVE-2023-22774", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22774" }, { "cve": "CVE-2023-22773", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22773" }, { "cve": "CVE-2023-22772", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22772" }, { "cve": "CVE-2023-22771", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22771" }, { "cve": "CVE-2023-22770", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22770" }, { "cve": "CVE-2023-22769", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22769" }, { "cve": "CVE-2023-22768", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22768" }, { "cve": "CVE-2023-22767", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22767" }, { "cve": "CVE-2023-22766", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22766" }, { "cve": "CVE-2023-22765", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22765" }, { "cve": "CVE-2023-22764", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22764" }, { "cve": "CVE-2023-22763", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22763" }, { "cve": "CVE-2023-22762", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22762" }, { "cve": "CVE-2023-22761", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22761" }, { "cve": "CVE-2023-22760", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22760" }, { "cve": "CVE-2023-22759", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22759" }, { "cve": "CVE-2023-22758", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22758" }, { "cve": "CVE-2023-22757", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22757" }, { "cve": "CVE-2023-22756", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22756" }, { "cve": "CVE-2023-22755", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22755" }, { "cve": "CVE-2023-22754", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22754" }, { "cve": "CVE-2023-22753", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22753" }, { "cve": "CVE-2023-22752", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22752" }, { "cve": "CVE-2023-22751", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22751" }, { "cve": "CVE-2023-22750", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22750" }, { "cve": "CVE-2023-22749", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22749" }, { "cve": "CVE-2023-22748", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22748" }, { "cve": "CVE-2023-22747", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2023-22747" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Aruba ArubaOS existieren mehrere Schwachstellen. Die Ursachen sind ungen\u00fcgende Eingabe-\u00dcberpr\u00fcfungen, Puffer\u00fcberl\u00e4ufe, unsachgem\u00e4\u00dfe Sitzungssteuerung, unsachgem\u00e4\u00dfe Autorisierungs-Pr\u00fcfungen und Path-Traversals. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um seine Rechte zu erweitern, Code zur Ausf\u00fchrung zu bringen, einen Cross Site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service zu verursachen." } ], "release_date": "2023-02-28T23:00:00Z", "title": "CVE-2021-3712" } ] }
wid-sec-w-2023-1030
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Siebel CRM ist eine CRM-L\u00f6sung von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Siebel CRM ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1030 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1030.json" }, { "category": "self", "summary": "WID-SEC-2023-1030 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1030" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Siebel CRM vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixSECR" } ], "source_lang": "en-US", "title": "Oracle Siebel CRM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:56.339+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1030", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Siebel CRM \u003c= 22.10", "product": { "name": "Oracle Siebel CRM \u003c= 22.10", "product_id": "T025891", "product_identification_helper": { "cpe": "cpe:/a:oracle:siebel_crm:22.10" } } }, { "category": "product_name", "name": "Oracle Siebel CRM \u003c= 23.2", "product": { "name": "Oracle Siebel CRM \u003c= 23.2", "product_id": "T027404", "product_identification_helper": { "cpe": "cpe:/a:oracle:siebel_crm:23.2" } } }, { "category": "product_name", "name": "Oracle Siebel CRM \u003c= 22.5", "product": { "name": "Oracle Siebel CRM \u003c= 22.5", "product_id": "T027405", "product_identification_helper": { "cpe": "cpe:/a:oracle:siebel_crm:22.5" } } }, { "category": "product_name", "name": "Oracle Siebel CRM \u003c= 23.3", "product": { "name": "Oracle Siebel CRM \u003c= 23.3", "product_id": "T027406", "product_identification_helper": { "cpe": "cpe:/a:oracle:siebel_crm:23.3" } } }, { "category": "product_name", "name": "Oracle Siebel CRM \u003c= 21.10", "product": { "name": "Oracle Siebel CRM \u003c= 21.10", "product_id": "T027407", "product_identification_helper": { "cpe": "cpe:/a:oracle:siebel_crm:21.10" } } } ], "category": "product_name", "name": "Siebel CRM" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21909", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21909" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2021-37695", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-37695" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2020-7712", "notes": [ { "category": "description", "text": "In Oracle Siebel CRM existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "last_affected": [ "T027407", "T027405", "T027406", "T027404", "T025891" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2020-7712" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
ghsa-q9wj-f4qw-6vfj
Vulnerability from github
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "openssl-src" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "111.16.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-3712" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": true, "github_reviewed_at": "2022-06-17T00:09:35Z", "nvd_published_at": "2021-08-24T15:15:00Z", "severity": "HIGH" }, "details": "ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL\u0027s own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "id": "GHSA-q9wj-f4qw-6vfj", "modified": "2024-06-24T21:22:32Z", "published": "2022-05-24T19:12:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2022-02" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2021-16" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4963" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210827-0010" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202210-02" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202209-02" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2021-0098.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10366" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "type": "CVSS_V3" } ], "summary": "Read buffer overruns processing ASN.1 strings" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.