Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-39293
Vulnerability from cvelistv5
Published
2022-01-24 00:00
Modified
2024-08-04 02:06
Severity ?
EPSS score ?
Summary
In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:06:41.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220217-0009/" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-19T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" }, { "url": "https://security.netapp.com/advisory/ntap-20220217-0009/" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-39293", "datePublished": "2022-01-24T00:00:00", "dateReserved": "2021-08-19T00:00:00", "dateUpdated": "2024-08-04T02:06:41.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-39293\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-01-24T01:15:07.920\",\"lastModified\":\"2024-11-21T06:19:08.180\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.\"},{\"lang\":\"es\",\"value\":\"En archive/zip en Go versiones anteriores a 1.16.8 y 1.17.x versiones anteriores a 1.17.1, un encabezado de archivo dise\u00f1ada (designando falsamente que hay muchos archivos presentes) puede causar un p\u00e1nico en NewReader o OpenReader. NOTA: este problema se presenta debido a una correcci\u00f3n incompleta de CVE-2021-33196\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.16.8\",\"matchCriteriaId\":\"ACE9470C-C34A-49D6-892D-FDDF8D39D64E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.17.0\",\"versionEndExcluding\":\"1.17.1\",\"matchCriteriaId\":\"E60B4986-2002-4864-939D-F28B4C1E61EC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_telegraf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E26C3B-E416-49D6-B296-33CD93694D39\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/dx9d7IOseHw\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220217-0009/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/dx9d7IOseHw\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220217-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
gsd-2021-39293
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-39293", "description": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.", "id": "GSD-2021-39293", "references": [ "https://www.suse.com/security/cve/CVE-2021-39293.html", "https://access.redhat.com/errata/RHSA-2022:0655", "https://access.redhat.com/errata/RHSA-2022:0434", "https://access.redhat.com/errata/RHSA-2022:0432", "https://access.redhat.com/errata/RHSA-2021:4902", "https://advisories.mageia.org/CVE-2021-39293.html", "https://security.archlinux.org/CVE-2021-39293", "https://linux.oracle.com/cve/CVE-2021-39293.html", "https://access.redhat.com/errata/RHSA-2022:1819", "https://access.redhat.com/errata/RHSA-2022:4814" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-39293" ], "details": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.", "id": "GSD-2021-39293", "modified": "2023-12-13T01:23:16.217513Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39293", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "refsource": "CONFIRM", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" }, { "name": "https://security.netapp.com/advisory/ntap-20220217-0009/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220217-0009/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.17.1", "versionStartIncluding": "1.17.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.16.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_insights_telegraf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39293" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" }, { "name": "https://security.netapp.com/advisory/ntap-20220217-0009/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220217-0009/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "name": "[debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-04-20T00:15Z", "publishedDate": "2022-01-24T01:15Z" } } }
icsa-22-167-09
Vulnerability from csaf_cisa
Published
2022-06-16 00:00
Modified
2022-06-16 00:00
Summary
Siemens SCALANCE LPE9403 Third-Party Vulnerabilities
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product 's confidentiality, integrity, and availability.
Critical infrastructure sectors
Multiple sectors
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product \u0027s confidentiality, integrity, and availability.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-222547.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-222547.txt" } ], "title": "Siemens SCALANCE LPE9403 Third-Party Vulnerabilities", "tracking": { "current_release_date": "2022-06-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-167-09", "initial_release_date": "2022-06-16T00:00:00.000000Z", "revision_history": [ { "date": "2022-06-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-167-09 Siemens SCALANCE LPE9403 Third-Party Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V2.0", "product": { "name": "SCALANCE LPE9403", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-20317", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-20317 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-20317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-20317.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20317" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-20317" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-33910 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-33910 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-33910.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33910" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition vulnerability was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-36221 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-36221 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-36221.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36221" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-36221" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The fix for CVE-2021-33196 can be bypassed by crafted inputs. As a result, the NewReader and OpenReader functions in archive/zip can still cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39293 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-39293 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39293.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41089", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where attempting to copy files using docker cp into a specially-crafted container can result in Unix file permission changes for existing files in the host\u2019s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41089 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41089 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41089.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41089" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where the data directory (typically /var/lib/docker) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41091 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41091 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41091.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41091" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41091" }, { "cve": "CVE-2021-41092", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Docker CLI where running docker login my-private-registry.example.com with a misconfigured configuration file (typically ~/.docker/config.json) listing a credsStore or credHelpers that could not be executed would result in any provided credentials being sent to registry-1.docker.io rather than the intended private registry.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41092 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41092 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41092.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41092" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41092" }, { "cve": "CVE-2021-41103", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41103 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41103 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41103.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41103" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41103" }, { "cve": "CVE-2022-0847", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2022-0847 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2022-0847 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2022-0847.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0847" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-0847" } ] }
ICSA-22-167-09
Vulnerability from csaf_cisa
Published
2022-06-16 00:00
Modified
2022-06-16 00:00
Summary
Siemens SCALANCE LPE9403 Third-Party Vulnerabilities
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product 's confidentiality, integrity, and availability.
Critical infrastructure sectors
Multiple sectors
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could cause crashes and unrestricted file access, impacting the product \u0027s confidentiality, integrity, and availability.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/icsSeveral recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on cisa.gov/icsin the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-222547.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2022/icsa-22-167-09.json" }, { "category": "self", "summary": "ICS Advisory ICSA-22-167-09 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-167-09" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "category": "external", "summary": "SSA-222547: Third-Party Component Vulnerabilities in SCALANCE LPE9403 before V2.0 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-222547.txt" } ], "title": "Siemens SCALANCE LPE9403 Third-Party Vulnerabilities", "tracking": { "current_release_date": "2022-06-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-22-167-09", "initial_release_date": "2022-06-16T00:00:00.000000Z", "revision_history": [ { "date": "2022-06-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-22-167-09 Siemens SCALANCE LPE9403 Third-Party Vulnerabilities" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V2.0", "product": { "name": "SCALANCE LPE9403", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK5998-3GS00-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE LPE9403" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows, when using the built-in HTTP form-based file upload mechanism, via the mg_handle_form_request API. Web applications that use the file upload form handler, and use parts of the user-controlled filename in the output path, are susceptible to directory traversal", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2020-27304 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2020-27304 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-27304.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27304" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2020-27304" }, { "cve": "CVE-2021-20317", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-20317 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-20317 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-20317.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20317" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-20317" }, { "cve": "CVE-2021-33910", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-33910 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-33910 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-33910.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33910" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-33910" }, { "cve": "CVE-2021-36221", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition vulnerability was found in Go. The incoming requests body weren\u0027t closed after the handler panic and as a consequence this could lead to ReverseProxy crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-36221 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-36221 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-36221.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36221" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-36221" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "The fix for CVE-2021-33196 can be bypassed by crafted inputs. As a result, the NewReader and OpenReader functions in archive/zip can still cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-39293 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-39293 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-39293.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39293" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41089", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where attempting to copy files using docker cp into a specially-crafted container can result in Unix file permission changes for existing files in the host\u2019s filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41089 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41089 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41089.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41089" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Moby (Docker Engine) where the data directory (typically /var/lib/docker) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41091 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41091 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41091.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41091" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41091" }, { "cve": "CVE-2021-41092", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Docker CLI where running docker login my-private-registry.example.com with a misconfigured configuration file (typically ~/.docker/config.json) listing a credsStore or credHelpers that could not be executed would result in any provided credentials being sent to registry-1.docker.io rather than the intended private registry.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41092 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41092 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41092.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41092" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41092" }, { "cve": "CVE-2021-41103", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2021-41103 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2021-41103 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-41103.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41103" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41103" }, { "cve": "CVE-2022-0847", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2022-0847 - SCALANCE LPE9403", "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "summary": "CVE-2022-0847 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2022-0847.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0847" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V2.0 or later version", "product_ids": [ "CSAFPID-0001" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109811123/" }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-0847" } ] }
rhsa-2022_4814
Vulnerability from csaf_redhat
Published
2022-05-31 09:48
Modified
2024-12-17 21:57
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.6.5 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es):
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.6.5 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es):\n\n* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes (CVE-2021-3807)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:4814", "url": "https://access.redhat.com/errata/RHSA-2022:4814" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2007557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557" }, { "category": "external", "summary": "2057579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057579" }, { "category": "external", "summary": "2072311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072311" }, { "category": "external", "summary": "2074044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074044" }, { "category": "external", "summary": "2074553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074553" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4814.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.5 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:57:25+00:00", "generator": { "date": "2024-12-17T21:57:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:4814", "initial_release_date": "2022-05-31T09:48:42+00:00", "revision_history": [ { "date": "2022-05-31T09:48:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-31T09:48:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:57:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.6", "product": { "name": "8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.6::el8" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.6.5-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.6.5-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "product": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.6.5-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.6.5-14" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.6.5-8" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.6.5-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.6.5-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.6.5-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64" }, "product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64 as a component of 8Base-RHMTC-1.6", "product_id": "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3807", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007557" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as \u0027will not fix\u0027.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "RHBZ#2007557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" }, { "category": "external", "summary": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-31T09:48:42+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4814" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-31T09:48:42+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:4814" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.6:rhmtc/openshift-migration-controller-rhel8@sha256:eadd64a4cafcd3fc91908cd33a6d8b8ffceefa5a156d6e6ab3e009083efa492f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-log-reader-rhel8@sha256:81539d76dc684112b82c813f50e462886526eca4d85d72c6fa7b19e1d653f917_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-must-gather-rhel8@sha256:87e2617616002346c1c8bf1ca4328dc71d58f5f2b7f49eb31165a789be8b747f_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-operator-bundle@sha256:bef6f99405b6ea016b794a11214f48abb1ed14e54fdafc8dc57a741a86a66980_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-registry-rhel8@sha256:27206cb9901c89601d7440f06797d4f3f11a058ef169df7326475be781277724_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rhel8-operator@sha256:a98821722ebe5038776bd9f7a0cc1cd59ee5b2b6b2f64a0ba670302f38e3d1f2_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:d7f77e58018abbb2f89a4d767ce3b70614bf74883c4e0238abd722d49c330a83_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-ui-rhel8@sha256:afb05f33dcb4a5f5d07581acf8bbf1fab191f7a849eb32ed754629791013c22b_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:9f7a89167eb2c7450a0fea724bf31a83cd1baccdc04a27a2a6b808b55aa30387_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:f34848547089c208a51d8f6b5296a978bd86b2f2a37a10845e255ca08259db64_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:e867d7765f464a9460fc3fe5fda406db667d158273b462ed86c2ef275618f027_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:fff289d2412da6fa9f3b519d1bbf6cf730294ecf462087a84a697be63b513962_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-migration-velero-rhel8@sha256:cf1aabb5f8a931a9520490289a3f443d1df115a3f900e6c267af90a641124963_amd64", "8Base-RHMTC-1.6:rhmtc/openshift-velero-plugin-rhel8@sha256:bcce92e939b72d317035fe3d188825b879d68441756835c8018d1bc2f434220d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2022_0434
Vulnerability from csaf_redhat
Published
2022-02-03 20:05
Modified
2024-12-17 21:54
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0
Notes
Topic
Release of OpenShift Serverless 1.20.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: Command-line arguments may overwrite global data (CVE-2021-38297)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7, 4.8, and 4.9, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0434", "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "2024838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024838" }, { "category": "external", "summary": "2024839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024839" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0434.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.20.0", "tracking": { "current_release_date": "2024-12-17T21:54:23+00:00", "generator": { "date": "2024-12-17T21:54:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:0434", "initial_release_date": "2022-02-03T20:05:14+00:00", "revision_history": [ { "date": "2022-02-03T20:05:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-03T20:05:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:54:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.20", "product": { "name": "Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.20::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=0.26.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.20.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.20.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=0.26.0-1" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=0.26.0-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64 as a component of Red Hat OpenShift Serverless 1.20", "product_id": "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.20" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-38297", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2012887" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: Command-line arguments may overwrite global data", "title": "Vulnerability summary" }, { "category": "other", "text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38297" }, { "category": "external", "summary": "RHBZ#2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "release_date": "2021-10-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: Command-line arguments may overwrite global data" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T20:05:14+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0434" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:56b99182c967851295a20445cd58c764721e7e9e9c7f9119797d9b1fb075b0f3_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:6a0732bb4b950bc09800902816f2924cdcf4b936b1d29eab5263eda688f26b88_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:e3fc742d90e6db1f187b72604a723fd3d396a239f3ee3736819a1c2e4ed5b272_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:7b9116020e29b9be4c60b6b47c5838a7af6eee295cb7359437f575672a928090_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:916bf46cff268283429c3c01488038a1299f902f1c868df354a5698e970d0a21_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:c92f780f85d109ab5cf1d9732829933d6065a3c618f03b0a5d89b12baa742f2f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:0c68cf5d255f5a2c355ec8eeba4f75bb21d9cbbd5dc5ae97cca1751bf5aeee59_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:84a79c977310f9491fe40e0d258cd6dba007148da7545227df67d67a198530ff_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:e799fd256c9f0c33b4fe272b9dfecd387998b36d2b871e9535ed83c9b26d80eb_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:04506133578ec20253494236e33688a85c81c414c956576f3307f1e89b5ab10e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:9d23699ad43fda781be9b2854fb7d62b436ba5f7b0969d9d5e6c64f395a71697_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:c8a5cc5ef83f9f269568eaf21b437709e5d0a85ce4853475db37db7cd5fce699_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:5470547f1149716073b1e60ecf6345a090476d5e58c2be92ac6a9cf6ede056c2_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:aef995055487c66070558fb6c6f29c40020006dc293a499bf2d760361738c804_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/client-kn-rhel8@sha256:b9520e98d39c40961975d9107c6e3ce48a61d10874ae8fd049a6913422d4d0db_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:17b46ea72c5f4ff31ca8c259fabb65ecd6df931f782a6a42ee60bcbc65727748_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:8505e03cb97d9594444be05e73ed080286993cebbdfa747095e683343be1fa93_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:e278b16e7e55dfdaf22bceb819fbf3b3ec14fe9d1c0f51df3b31155c0d53df58_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:13f141c7bcc40618ba84ea093ebea2e7a58f015b2a682aee7fc8f3bfc14228fb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:a5e03b58a96eb78de121c6045945c641a5ac3895ae240c880b89d17b510a7f76_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-controller-rhel8@sha256:e2c6d9061c3f2dc7c6194dd7cfd00ac427794bca9a19729e22749312378042b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:726f2958e1a08d65903c824350a8ff1adaf0bc24b34dc3ed05ec388f092cab01_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:a2fe424ae111aaa42f2f8ca40e4401f1883c3196a2934c2c1ce0cbf5ad724ba9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:f02ed27fefe4c5eb0ab944ddb5751804e8d46a7201250f6800e16dae38c4669d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7766085969456335183792b5588c03b7132bcaf2032ff4ef630d0d979ec260e9_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:7e4b6b445c7dc088c09f54807b81775330f9204ca0b41942d19f48d634043690_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:ba39c5d4e034cfd301db64a509e10080900df4b9391d97d3b65bb1443f122ef3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:26c68751e285ed15e5514e8e25b33bec2fe2fa445f70c33d2d922af1bbfdb393_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:78c66c85a4b895f4b771d0475f7e0e93b36fef8f2dbcbd6e52fffc6697ced39b_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:a7668dc2e89acf16569559d04d342ea1875b5af797a1cc8f9fde1457fb4c03f0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:1657b2e280940c4f8b871c1cc22546b92c9111f48fbedc7f821573d65e72fe11_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a84a32e3872b770c33cb08f4879abfc89fc1a1c917616b2ccc9389f2d495fe1b_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:ed09083dd0b38e9cfb515e6bbc1b3f160d1765c669dc23d91af1f6964c9e9ec5_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:75c95e7952984f0fb8a83ea3457cc73b2ca8bb99d2093ee2df63c734f7f43346_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:881ba0289dd78c0f845d13db99ae06397c0cb1354c1dae91ec1de69d05363e87_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:d261b7ca2e725d5b7be390b048edebadacbf8d9c0163805438e397ca050f80ce_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:74869bed9d6ec00d4516efd64717a6eeef392bf86f43c98664b51f7054a37c35_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:818af934e25d7e57dc6d699a3b8727c61986b06afae99313df3f23bd2559ada4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-mtping-rhel8@sha256:d3af56305aaa274d01c191b3ec81676ea23b3e61925f91828e88342b3286a2d0_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:27dd1fd65aa81782953a614a2fe62904e7546257dc86322d0ddf11e5251631e9_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:8f3d5948e6d59a0379ca82f55beb79b75640c442a283416e65ec60e4690e5890_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:b7b93bddec1a3752ddd6270d3f328858348bd64b42ec98aae5e5c77e31c7ff03_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:8eff3546c303ed5cb50177f16d84a4908552c7c49d185cf8cbc9e2d0007d5cd3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:bd0e3580de74b0016845571f3242cf8f99ca5d341cb9228db3c3b14a622abb48_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:c24ed00421912a05831d76943f913b82cea1f9a8dd0599f535f13b477b025ce6_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:4ce209284a2c25a7285062cd293293992fb5899199ab5c0a8a0e187b7ebf7d85_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:c78bd6d9d42d70d152733565d57516b2982b3343ae166a58f9330a1b3c6dd7eb_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/eventing-webhook-rhel8@sha256:fae07bf56539bcc5c8cd304914447e6b6a891852d9332df352c65e05e3a371e3_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:4eb53463f16393d27cca9ea9982bacd1ed7edc1191209ea54c76a6237993ce1a_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:8c8112b1b6634356156ca1baa36312a0c9e997511998989c9fde6c0855e0ca3d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/ingress-rhel8-operator@sha256:e17b106c3cabbccef7cfc9f049d989668e6e2fcabcc3eca7dab2b0414fe872b7_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1d1687d9baa80a099326c5dbfffa5dd6252bcb6e5eab289dbd56ed2cbf76efc8_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:84694bf72cfbee8fc35bc9b066ccf7518be198c4b16b21f1f116596b7b85433f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:a22110d49b5d32de35e4cd5ec6a56da150c76c68aee873e235a3d3f6207987c4_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:273d7a40181c9d21e6988f2667929e5623de0a8249ba9bbadb08ce27686edf10_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:d57f4f8c0018d208f276143f224af12d48c8da0f0be668c8bc7c9be5bdd791ef_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/knative-rhel8-operator@sha256:f50bb5eb02161e2aa24d79eec84e4d3cd69465fe4b4329fc6608046047204eda_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9a39d82fd555df5458f1d017d9de2c48d04cae3b818f2ff93b546edd2665e873_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:9b14951945043df25e33db68993dd4e874eacdd1d75350375599665e29f5d716_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/kourier-control-rhel8@sha256:e37d553ea1c1708b82ea37815abdfe64f9531d56aefcaea4f18db8cf1c09bc0e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:00c268bb0c5dc22ebd288ef00e69ebfc168fcb609a0c0c7750b62e0a9018a51e_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:bbfa04c9f6b234dc993b4116da5438005bd69ff32a944276bbafcd4f9175de8a_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-controller-rhel8@sha256:c1ff836e48309c08182c2f20e7f3387c50e67656c6c77310560261b443ab27d1_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:444ab78e1e6ed23d7e342cdcb2da161f493acc63810228a08619f2174bdbc058_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:b3043d5f3aac09fd5b63fffeb7d1e8d3a2fbd723da7d0289f48255e4e5f8aebc_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/net-istio-webhook-rhel8@sha256:f69e2035185868f4521b52e8fda74f9e49c289280ef0bf16289ff302c15269df_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-operator-bundle@sha256:003a5c5c3682db69aa57da4c05ed3ccbaf94fb80a4972c8ddcf91eb3d5e299b9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:1e379f64031a6c8af93457fa8aeb6441534bb4c011d637939406e0a471322231_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:3245e73ab2a02e880a57cd8d3be427a7c451fea6151ad68cf469553fc0063bc3_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serverless-rhel8-operator@sha256:64b2f3d87f86be59b9f71cbe92a61600a3290695fb5c7f808d08ba332278e133_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:0e2e5bb4f20c958fb5ea71da82614334069e199a5ce05ddb748aff34b25dff93_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:7789daefd8f0e8134fb2fe6ae154402fc44f3ea0c8dc7ca3b2c9ebdb79ce7551_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-activator-rhel8@sha256:c0c1acdf9abfb73630d1a550646fd4dc0ca764fc58c53fbd2cdf582ef70c8649_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:4cde571a2658f477a4cb52895494583cf5ffe9143fbf699faba83752f307f63e_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:7f7687a6c3a472183af10e4df4e330b080979851917966a5fe41e361a5b967dd_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:f457cf4746e992f300d291a4e881d565752fafdd28f7d840f181ed1237ae6f98_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:9346c770bbd55d4cc7dcf36e1bea28f6710c7ac34979fc66beb6165e103be50b_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:aadac6f2c3af41ade58f0a6bb0a4e840c331260bccd2ca4bd792e649f0267234_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-autoscaler-rhel8@sha256:d2f90bb4bb1a5b1b1c5f4b4a2c96ca3a2f8f2814b5b2751658970095bf49656c_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:04a6db25142117354d2ae0033e86c569fffccc9aefa8909c11bcccd273e23cd7_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:08d5cb9b7c546952d46edcef01b3dda514e3c5758a085dec83db1a3f8348be8d_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-controller-rhel8@sha256:2423823b744f3d2e4e8d225ff336e3cc12fb76a5fb8209101bdb6ded0ac8d1cf_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:0e2f73b583e330b3f532fec09e019c4ed0e11c859b31bfe18805ce87d605b29d_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:6066fd178b8dff4849def456afa31d6ef2e756c82ce2dcce5b3267acdcde1e3c_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:faca8101513f6d2a6ca00acc5cf9ab17cc6cea0df1012a7e1c9c8d05a9681137_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:415b8de0a07253335bfabaca378281354132d44f8245e2880ae60272bccfda83_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:7dbbed51efff6c906de38e30dce6eee020974a553906fe6d4d6b70a11fe2cb5f_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:a794e3dbd05a35fb10a1cab68db87b7fb3e0762be0c0e49b1e78ecf95303a869_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:469b43a91f24496f1f3b3071558fffda6748fa32001ce7c26ba0bf0af2599ac9_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:90b0d0593ef2ab05e6d1aba5016543e54046b5b3baa5c7025882d05997e85503_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-queue-rhel8@sha256:f2d8e81015e477ff7b0a6dc70343d904fa00b574a04285648cf8d4374ded8bae_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:10a34c2d20addbb5fa747db62f31fc1367a75a430c75884bfb13bc85643cc522_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1f77207a00c6d9292f3b20f18c7f0b780202644939b4daf87c758ec6d0e5bd81_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:d37c4c2050b803d6998a810c7d6e5189c78cf1341a1e0388f14e9d25a5fb7549_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:44f412fc7d99403385120937140d630efec6863d1ef8e9465ab6a493ccb179f5_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:6caca935ce7b6573ef924d24d113e5f1ee78e11e6c63d0034b4c1eadffd339e7_amd64", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/serving-webhook-rhel8@sha256:f3485c3f73cc688bb278a3ec39c1576824b513f35b1f11f339320571b022b6c8_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:3e74ef8aa6bf751f3d74137b625287322f1a63a1448e1769968d68598d049c68_ppc64le", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:d2bf91bf8a689cae82013d698648cdfbaca77dd307a3090d3374fcdf670371c5_s390x", "8Base-Openshift-Serverless-1.20:openshift-serverless-1/svls-must-gather-rhel8@sha256:dca735e59b8d6a94fbb82c0e45e32980838c1368e1fa645f18da93ffc1d552ff_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2021_4902
Vulnerability from csaf_redhat
Published
2021-12-01 17:22
Modified
2024-12-17 21:52
Summary
Red Hat Security Advisory: ACS 3.67 security and enhancement update
Notes
Topic
Updated images are now available for Red Hat Advanced Cluster Security for
Kubernetes (RHACS).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:
OpenShift Dedicated support
RHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.
1. Use OpenShift OAuth server as an identity provider
If you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS.
2. Enhancements for CI outputs
Red Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.
3. Runtime Class policy criteria
Users can now use RHACS to define the container runtime configuration that may be used to run a pod’s containers using the Runtime Class policy criteria.
Security Fix(es):
* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)
* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)
* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* helm: information disclosure vulnerability (CVE-2021-32690)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fixes
The release of RHACS 3.67 includes the following bug fixes:
1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.
2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.
System changes
The release of RHACS 3.67 includes the following system changes:
1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.
2. The Port exposure method policy criteria now include route as an exposure method.
3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.
4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.
5. The RHACS Jenkins plugin now provides additional security information.
6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.
7. The default uid:gid pair for the Scanner image is now 65534:65534.
8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.
9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.
10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode.
11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check & deployment check
12. You can now use a regular expression for the deployment name while specifying policy exclusions
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat Advanced Cluster Security for\nKubernetes (RHACS).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The release of RHACS 3.67 provides the following new features, bug fixes, security patches and system changes:\n\nOpenShift Dedicated support\n\nRHACS 3.67 is thoroughly tested and supported on OpenShift Dedicated on Amazon Web Services and Google Cloud Platform.\n\n1. Use OpenShift OAuth server as an identity provider\nIf you are using RHACS with OpenShift, you can now configure the built-in OpenShift OAuth server as an identity provider for RHACS. \n\n2. Enhancements for CI outputs\nRed Hat has improved the usability of RHACS CI integrations. CI outputs now show additional detailed information about the vulnerabilities and the security policies responsible for broken builds.\n\n3. Runtime Class policy criteria\nUsers can now use RHACS to define the container runtime configuration that may be used to run a pod\u2019s containers using the Runtime Class policy criteria.\n\nSecurity Fix(es):\n\n* civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API (CVE-2020-27304)\n\n* nodejs-axios: Regular expression denial of service in trim function (CVE-2021-3749)\n\n* nodejs-prismjs: ReDoS vulnerability (CVE-2021-3801)\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes\nThe release of RHACS 3.67 includes the following bug fixes:\n\n1. Previously, when using RHACS with the Compliance Operator integration, RHACS did not respect or populate Compliance Operator TailoredProfiles. This has been fixed.\n\n2. Previously, the Alpine Linux package manager (APK) in Image policy looked for the presence of apk package in the image rather than the apk-tools package. This issue has been fixed.\n\nSystem changes\nThe release of RHACS 3.67 includes the following system changes:\n\n1. Scanner now identifies vulnerabilities in Ubuntu 21.10 images.\n2. The Port exposure method policy criteria now include route as an exposure method.\n3. The OpenShift: Kubeadmin Secret Accessed security policy now allows the OpenShift Compliance Operator to check for the existence of the Kubeadmin secret without creating a violation.\n4. The OpenShift Compliance Operator integration now supports using TailoredProfiles.\n5. The RHACS Jenkins plugin now provides additional security information.\n6. When you enable the environment variable ROX_NETWORK_ACCESS_LOG for Central, the logs contain the Request URI and X-Forwarded-For header values.\n7. The default uid:gid pair for the Scanner image is now 65534:65534.\n8. RHACS adds a new default Scope Manager role that includes minimum permissions to create and modify access scopes.\n9. If microdnf is part of an image or shows up in process execution, RHACS reports it as a security violation for the Red Hat Package Manager in Image or the Red Hat Package Manager Execution security policies.\n10. In addition to manually uploading vulnerability definitions in offline mode, you can now upload definitions in online mode. \n11. You can now format the output of the following roxctl CLI commands in table, csv, or JSON format: image scan, image check \u0026 deployment check\n12. You can now use a regular expression for the deployment name while specifying policy exclusions", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4902", "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "2005445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2016640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640" }, { "category": "external", "summary": "ROX-9371", "url": "https://issues.redhat.com/browse/ROX-9371" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4902.json" } ], "title": "Red Hat Security Advisory: ACS 3.67 security and enhancement update", "tracking": { "current_release_date": "2024-12-17T21:52:56+00:00", "generator": { "date": "2024-12-17T21:52:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:4902", "initial_release_date": "2021-12-01T17:22:46+00:00", "revision_history": [ { "date": "2021-12-01T17:22:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-01T17:22:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:52:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHACS 3.67 for RHEL 8", "product": { "name": "RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67", "product_identification_helper": { "cpe": "cpe:/a:redhat:advanced_cluster_security:3.67::el8" } } } ], "category": "product_family", "name": "Red Hat Advanced Cluster Security for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.67.0-2" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.67.0-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64 as a component of RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" }, "product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "relates_to_product_reference": "8Base-RHACS-3.67" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64 as a component of RHACS 3.67 for RHEL 8", "product_id": "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" }, "product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64", "relates_to_product_reference": "8Base-RHACS-3.67" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27304", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-10-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016640" } ], "notes": [ { "category": "description", "text": "A remote code execution vulnerability was found in CivetWeb (embeddable web server/library). Due to a directory traversal issue, an attacker is able to add or overwrite files that are subsequently executed which lead to impact to confidentiality, integrity, and availability of the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only impacts CivetWeb-based web applications that use the built-in file upload form handler (full working example in the \u201cembedded_c\u201d example in the CivetWeb sources).\n\nRed Hat Advanced Cluster Security includes code from CivetWeb in the Collector component, however it does not use the file upload form handler, hence is not impacted by this vulnerability. This vulnerability is rated Low for Red Hat Advanced Cluster Security.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27304" }, { "category": "external", "summary": "RHBZ#2016640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27304", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27304" }, { "category": "external", "summary": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ", "url": "https://groups.google.com/g/civetweb/c/yPBxNXdGgJQ" }, { "category": "external", "summary": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/", "url": "https://jfrog.com/blog/cve-2020-27304-rce-via-directory-traversal-in-civetweb-http-server/" } ], "release_date": "2021-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "civetweb: directory traversal when using the built-in example HTTP form-based file upload mechanism via the mg_handle_form_request API" }, { "cve": "CVE-2021-3749", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-31T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1999784" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in the nodejs axios. This flaw allows an attacker to provide crafted input to the trim function, which might cause high resources consumption and as a consequence lead to denial of service. The highest threat from this vulnerability is system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-axios: Regular expression denial of service in trim function", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift Container Platform (OCP) grafana-container does package a vulnerable version of nodejs axios. However, due to the instance being read only and behind OpenShift OAuth, the impact of this vulnerability is Low.\n\n* Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.1 and previous versions does contain a vulnerable version of nodejs axios, RHACM 2.2 on towards are not affected versions. For RHACM 2.1, due to the instance being read only and behind OAuth, the impact of this vulnerability is Low.\n\n* Because Service Telemetry Framework 1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF\u0027s service-telemetry-operator-container and smart-gateway-operator-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3749" }, { "category": "external", "summary": "RHBZ#1999784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3749" }, { "category": "external", "summary": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929", "url": "https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929" }, { "category": "external", "summary": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31", "url": "https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31" } ], "release_date": "2021-08-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-axios: Regular expression denial of service in trim function" }, { "cve": "CVE-2021-3801", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2005445" } ], "notes": [ { "category": "description", "text": "Insufficient Regular Expression Complexity in prismjs leads to a Regular Expression Denial of Service (ReDoS) attack. An unauthenticated attacker can exploit this flaw to cause an application to consume an excess amount of CPU by providing a crafted HTML comment as input. This can result in a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-prismjs: ReDoS vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) grafana-container does package a vulnerable verison of prismjs. However due to the instance being read only and behind OpenShift OAuth, it has been given a Low impact. Additionally it has been marked as wont-fix at this time and may be fixed in a future release.\n\nJust as OCP, OpenShift ServiceMesh (OSSM) components are behind OpenShift OAuth what reducing impact to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3801" }, { "category": "external", "summary": "RHBZ#2005445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005445" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3801" } ], "release_date": "2021-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-prismjs: ReDoS vulnerability" }, { "cve": "CVE-2021-23343", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-05-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1956818" } ], "notes": [ { "category": "description", "text": "A flaw was found in nodejs-path-parse. All versions of package path-parse are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Had Quay , whilst a vulnerable version of `path-parse` is included in the quay-rhel8 container it is a development dependency only, hence the impact by this vulnerability is low.\n\nIn OpenShift Container Platform (OCP), the hadoop component which is a part of the OCP metering stack, ships the vulnerable version of \u0027path-parse\u0027.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected component is marked as wontfix.\nThis may be fixed in the future.\n\nIn Red Hat OpenShift Container Storage 4 the noobaa-core container includes the affected version of `path-parse`, however the vulnerable functionality is currently not used in any part of the product.\n\nIn Red Hat Virtualization cockpit-ovirt, ovirt-engine-ui-extensions and ovirt-web-ui use vulnerable version of `path-parse`, however for cockpit-ovirt it is a development time dependency only, and for ovirt-engine-ui-extensions and ovirt-web-ui the vulnerable functions are never used.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23343" }, { "category": "external", "summary": "RHBZ#1956818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23343" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067", "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067" } ], "release_date": "2021-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe" }, { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-32690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-06-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1978144" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Helm, which could allow credentials associated with one Helm repository to be leaked to another repository referenced by the first one. In order to exploit this vulnerability, an attacker would need to control a repository trusted by the configuration of the target Helm instance.", "title": "Vulnerability description" }, { "category": "summary", "text": "helm: information disclosure vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes:\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are using helm chart provided by the installer, so components are not using untrusted charts except in the application-lifecycle area. For this reason we marked the impact as low. For RHACM, the credentials could be leaked only when a helm chart is stored in a domain other than the helm repository itself. In practice, this rarely happens as the chart is stored in the same helm repository. For example, this chart in the helm repo https://charts.helm.sh/stable/index.yaml references only charts stored in the same domain (charts.heml.sh). From version, 2.2 onwards, multicloud-operators-placementrule and multicloud-operators-deployable do not use helm at all.\n\nOpenShift Developer Tools and Services:\n\nThe OpenShift Helm team has analyzed this CVE and we have come to the conclusion that this only affects OpenShift Helm customers that use the CLI to install and update charts. It does not affect customers that use the OpenShift Console to install and update charts. To mitigate this issue, customers can refresh their Helm cli by following the Red Had official Helm install guide here: https://docs.openshift.com/container-platform/4.7/cli_reference/helm_cli/getting-started-with-helm-on-openshift-container-platform.html#installing-helm_getting-started-with-helm-on-openshift. The mirror (https://mirror.openshift.com/pub/openshift-v4/clients/helm/latest/) have already been updated with helm 3.6.2 which contains the fix for this CVE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-32690" }, { "category": "external", "summary": "RHBZ#1978144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-32690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32690" }, { "category": "external", "summary": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf", "url": "https://github.com/helm/helm/security/advisories/GHSA-56hp-xqp3-w2jf" } ], "release_date": "2021-06-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "helm: information disclosure vulnerability" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "known_not_affected": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-01T17:22:46+00:00", "details": "To take advantage of these new features, fixes and changes, please upgrade Red Hat Advanced Cluster Security for Kubernetes to version 3.67.", "product_ids": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4902" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.67:advanced-cluster-security/rhacs-operator-bundle@sha256:9629a16f4009d48e580bc389d632a43c698ffd53c74364293fcf035a4c944382_amd64", "8Base-RHACS-3.67:advanced-cluster-security/rhacs-rhel8-operator@sha256:bf785fa6b8f22a473d1cc58aa9877f41f1161fef360883fee385c4ae421840e2_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2022_1819
Vulnerability from csaf_redhat
Published
2022-05-10 14:02
Modified
2024-12-17 21:56
Summary
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: Command-line arguments may overwrite global data (CVE-2021-38297)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
* golang: debug/macho: invalid dynamic symbol table command can cause panic (CVE-2021-41771)
* golang: archive/zip: Reader.Open panics on empty string (CVE-2021-41772)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\n* golang: debug/macho: invalid dynamic symbol table command can cause panic (CVE-2021-41771)\n\n* golang: archive/zip: Reader.Open panics on empty string (CVE-2021-41772)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1819", "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "2014704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014704" }, { "category": "external", "summary": "2020725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020725" }, { "category": "external", "summary": "2020736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020736" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1819.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:56:59+00:00", "generator": { "date": "2024-12-17T21:56:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:1819", "initial_release_date": "2022-05-10T14:02:26+00:00", "revision_history": [ { "date": "2022-05-10T14:02:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-10T14:02:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:56:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8060020220221035359:76a129d7", "product": { "name": "go-toolset:rhel8:8060020220221035359:76a129d7", "product_id": "go-toolset:rhel8:8060020220221035359:76a129d7", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8060020220221035359:76a129d7" } } }, { "category": "product_version", "name": "golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product": { "name": "golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_id": "golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product": { "name": "golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_id": "golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product": { "name": "golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_id": "golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product": { "name": "golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_id": "golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_id": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_id": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_id": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product_id": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product_id": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_id": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_id": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_id": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_id": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_id": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_id": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_id": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_id": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_id": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product": { "name": "golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_id": "golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.17.7-1.module%2Bel8.6.0%2B14297%2B32a15e19?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, "product_reference": "go-toolset:rhel8:8060020220221035359:76a129d7", "relates_to_product_reference": "AppStream-8.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src" }, "product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64" }, "product_reference": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le" }, "product_reference": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x" }, "product_reference": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src" }, "product_reference": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64" }, "product_reference": "go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64" }, "product_reference": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le" }, "product_reference": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x" }, "product_reference": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src" }, "product_reference": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64" }, "product_reference": "golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64" }, "product_reference": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le" }, "product_reference": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x" }, "product_reference": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64" }, "product_reference": "golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" }, "product_reference": "golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" }, "product_reference": "golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64 as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64" }, "product_reference": "golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" }, "product_reference": "golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch as a component of go-toolset:rhel8:8060020220221035359:76a129d7 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" }, "product_reference": "golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "relates_to_product_reference": "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-38297", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2012887" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: Command-line arguments may overwrite global data", "title": "Vulnerability summary" }, { "category": "other", "text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38297" }, { "category": "external", "summary": "RHBZ#2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "release_date": "2021-10-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: Command-line arguments may overwrite global data" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" }, { "cve": "CVE-2021-41771", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2020725" } ], "notes": [ { "category": "description", "text": "An out of bounds read vulnerability was found in debug/macho of the Go standard library. When using the debug/macho standard library (stdlib) and malformed binaries are parsed using Open or OpenFat, it can cause golang to attempt to read outside of a slice (array) causing a panic when calling ImportedSymbols. An attacker can use this vulnerability to craft a file which causes an application using this library to crash resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: debug/macho: invalid dynamic symbol table command can cause panic", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Service Telemetry Framework, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41771" }, { "category": "external", "summary": "RHBZ#2020725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41771", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41771" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: debug/macho: invalid dynamic symbol table command can cause panic" }, { "cve": "CVE-2021-41772", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2020736" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go where Reader.Open (the API implementing io/fs.FS introduced in Go 1.16) can panic when parsing a crafted ZIP archive containing completely invalid names or an empty filename argument.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: Reader.Open panics on empty string", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s sg-core-container.\n\n* Because Red Hat Ceph Storage only uses Go\u0027s archive/zip for the Grafana CLI and thus is not directly exploitable, the vulnerability has been rated low for Red Hat Ceph Storage.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41772" }, { "category": "external", "summary": "RHBZ#2020736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41772", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/0fM21h43arc", "url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc" } ], "release_date": "2021-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: Reader.Open panics on empty string" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-10T14:02:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1819" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:go-toolset-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.src", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.aarch64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.ppc64le", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.s390x", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-bin-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-docs-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-misc-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-race-0:1.17.7-1.module+el8.6.0+14297+32a15e19.x86_64", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-src-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch", "AppStream-8.6.0.GA:go-toolset:rhel8:8060020220221035359:76a129d7:golang-tests-0:1.17.7-1.module+el8.6.0+14297+32a15e19.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" } ] }
rhsa-2022_0655
Vulnerability from csaf_redhat
Published
2022-02-28 20:49
Modified
2024-12-17 21:54
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.9.23 bug fix and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.9.23 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.9.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.23. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2022:0654
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
Security Fix(es):
* golang: archive/zip: malformed archive may cause panic or memory
exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-x86_64
The image digest is sha256:1c13f0926c37c122eb5c86afd754c007f38977c8fc32d7da090490f556945afd
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-s390x
The image digest is sha256:24e3fcc5f5f28df01668ad412afbc002a110709da52803fe19d6e1ef785fa654
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-ppc64le
The image digest is sha256:4be36ad64852e2f241b78a3481474cd2cf124da8ec2d9263edf4264bfbc8c7f4
All OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.9.23 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.9.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.9.23. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2022:0654\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nSecurity Fix(es):\n\n* golang: archive/zip: malformed archive may cause panic or memory\nexhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-x86_64\n\nThe image digest is sha256:1c13f0926c37c122eb5c86afd754c007f38977c8fc32d7da090490f556945afd\n\n(For s390x architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-s390x\n\nThe image digest is sha256:24e3fcc5f5f28df01668ad412afbc002a110709da52803fe19d6e1ef785fa654\n\n(For ppc64le architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.9.23-ppc64le\n\nThe image digest is sha256:4be36ad64852e2f241b78a3481474cd2cf124da8ec2d9263edf4264bfbc8c7f4\n\nAll OpenShift Container Platform 4.9 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0655", "url": "https://access.redhat.com/errata/RHSA-2022:0655" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1996751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996751" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2014003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014003" }, { "category": "external", "summary": "2038406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038406" }, { "category": "external", "summary": "2040530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040530" }, { "category": "external", "summary": "2040594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040594" }, { "category": "external", "summary": "2050271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050271" }, { "category": "external", "summary": "2050911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050911" }, { "category": "external", "summary": "2052307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052307" }, { "category": "external", "summary": "2052553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052553" }, { "category": "external", "summary": "2052710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052710" }, { "category": "external", "summary": "2052929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052929" }, { "category": "external", "summary": "2053149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053149" }, { "category": "external", "summary": "2053581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053581" }, { "category": "external", "summary": "2054139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054139" }, { "category": "external", "summary": "2054608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2054608" }, { "category": "external", "summary": "2055100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055100" }, { "category": "external", "summary": "2056631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056631" }, { "category": "external", "summary": "2056638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056638" }, { "category": "external", "summary": "2056826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056826" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0655.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.9.23 bug fix and security update", "tracking": { "current_release_date": "2024-12-17T21:54:13+00:00", "generator": { "date": "2024-12-17T21:54:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:0655", "initial_release_date": "2022-02-28T20:49:34+00:00", "revision_history": [ { "date": "2022-02-28T20:49:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-28T20:49:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:54:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.9", "product": { "name": "Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.9::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202160239.p0.gf48b8d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "product": { "name": "openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "product_id": "openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "product": { "name": "openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "product_id": "openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202230318.p0.g8d748bd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "product": { "name": "openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "product_id": "openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "product": { "name": "openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "product_id": "openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202160527.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "product": { "name": "openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "product_id": "openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "product": { "name": "openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "product_id": "openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202161517.p0.gfb8cc3f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "product": { "name": "openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "product_id": "openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "product": { "name": "openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "product_id": "openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "product_id": "openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202160918.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "product": { "name": "openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "product_id": "openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202161218.p0.gb64dc34.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "product": { "name": "openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "product_id": "openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202160527.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "product": { "name": "openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "product_id": "openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202230509.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "product_id": "openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202230509.p0.gdaa0798.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "product": { "name": "openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "product_id": "openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202160239.p0.gf48b8d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "product": { "name": "openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "product_id": "openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "product": { "name": "openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "product_id": "openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202230318.p0.g8d748bd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "product": { "name": "openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "product_id": "openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "product": { "name": "openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "product_id": "openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202160527.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "product": { "name": "openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "product_id": "openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "product_id": "openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202161517.p0.gfb8cc3f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "product": { "name": "openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "product_id": "openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "product": { "name": "openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "product_id": "openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "product_id": "openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202160918.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "product": { "name": "openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "product_id": "openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202161218.p0.gb64dc34.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "product": { "name": "openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "product_id": "openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202160527.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "product": { "name": "openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "product_id": "openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202230509.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "product_id": "openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202230509.p0.gdaa0798.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "product": { "name": "openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "product_id": "openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202160239.p0.gf48b8d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "product": { "name": "openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "product_id": "openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "product": { "name": "openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "product_id": "openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202230318.p0.g8d748bd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "product": { "name": "openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "product_id": "openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "product": { "name": "openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "product_id": "openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202160527.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "product": { "name": "openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "product_id": "openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "product_id": "openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202161517.p0.gfb8cc3f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "product_id": "openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "product": { "name": "openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "product_id": "openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202160918.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "product_id": "openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202161218.p0.gb64dc34.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "product": { "name": "openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "product_id": "openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202160527.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "product": { "name": "openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "product_id": "openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202230509.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202230509.p0.gdaa0798.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "product_id": "openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.9.0-202202160239.p0.gf48b8d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "product": { "name": "openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "product_id": "openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "product": { "name": "openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "product_id": "openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.9.0-202202230318.p0.g8d748bd.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "product": { "name": "openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "product_id": "openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "product": { "name": "openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "product_id": "openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.9.0-202202160527.p0.g932d502.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "product_id": "openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.9.0-202202161517.p0.gfb8cc3f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64", "product": { "name": "openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64", "product_id": "openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.9.0-202202212240.p0.g4391c01.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.9.0-202202160918.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.9.0-202202160527.p0.gaf84740.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.9.0-202202161218.p0.gb64dc34.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "product_id": "openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.9.0-202202160527.p0.gb181f1f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "product": { "name": "openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "product_id": "openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.9.0-202202230509.p0.ged0b846.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.9.0-202202230509.p0.gdaa0798.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64", "product_id": "openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.9.0-202202160527.p0.g5035cc3.assembly.stream" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le" }, "product_reference": "openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x" }, "product_reference": "openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le" }, "product_reference": "openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64" }, "product_reference": "openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x" }, "product_reference": "openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64" }, "product_reference": "openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le" }, "product_reference": "openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64" }, "product_reference": "openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x" }, "product_reference": "openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64" }, "product_reference": "openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le" }, "product_reference": "openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x" }, "product_reference": "openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64" }, "product_reference": "openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64" }, "product_reference": "openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le" }, "product_reference": "openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x" }, "product_reference": "openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64" }, "product_reference": "openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x" }, "product_reference": "openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64" }, "product_reference": "openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le" }, "product_reference": "openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le" }, "product_reference": "openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x" }, "product_reference": "openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64" }, "product_reference": "openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x" }, "product_reference": "openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64" }, "product_reference": "openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le" }, "product_reference": "openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64" }, "product_reference": "openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "relates_to_product_reference": "8Base-RHOSE-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64 as a component of Red Hat OpenShift Container Platform 4.9", "product_id": "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64" ], "known_not_affected": [ "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-28T20:49:34+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0655" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:04ab8bcbcc7f3eb67b308c204c615d462341a5ed957cde3d201f290880dbe5cf_arm64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:136fe9d026cd073204a70ca41735c3985821132132c6efb4552a007d263ec077_ppc64le", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:957a1e03022763253ef997eca1d0b99b8493e08d9809fb686621a51e9ce4455f_amd64", "8Base-RHOSE-4.9:openshift4/network-tools-rhel8@sha256:dd5b3aa54338a9bccd44c7f232d71ebf22a780b234059c6c029b73ec144c595e_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:534671733716fef83d3be834255d3521f8eda3b3d684024d5bc1d888414233a3_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:5468caef290a4834c82d4961725145a0c6762ae95a264314219f7367ecabc1b2_amd64", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:d6c9607fc5911858a2fcc18172c924465ee4c08e8abc9c77dd3e4518936806a6_s390x", "8Base-RHOSE-4.9:openshift4/ose-baremetal-installer-rhel8@sha256:daa5d19be2897ce9f376cb0b618c49548b177abbf81716036ba389d2227a4bc6_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:0cbf9b87b05eb82ef6d98b86b216f6cb5bb81b783c264b314c377ca5a93b9e57_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:86935754535e107ef5b1d53e417df76289f1d8aaaa53b4e2235e8715fdcaf58e_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-alt-rhel8@sha256:f10e561835226d4a583617e874b8530d8f751d8081e4fd5a79cb4996ba681db0_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:751df5c377d228f76205ca7a500c23316a65291b8a852fbb2c7ef48084190d7d_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:7ceeb47e089d26d3da8f6445dc67440e90daf2b41829a5fdfba82001b39cf571_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts-alt-rhel8@sha256:a681352e23bfd7b4bf92be081212ca9e26258544679bbc31ba438f50d952980f_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:00b0d6373a81da5578916ec91e0790193ab1aa245831f00488741b9770429a83_amd64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:35a26908f9a5fdc68a7a0254563a2dd35cedb74404bc49f0ad362fdcc642d7a1_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:4e9eef03d52d7b1bce8e5ca946f487198e191ec77676aaa3b386416df9257304_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli-artifacts@sha256:cef5172682d679a4cd241642fe8e34277cd9201c3762698d984da5819831d087_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:4522ddf917d1b704edb693980ec439d4a45a838963e1f89b2d75f1d451ee5350_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:696940caa4be2f7c94c5e145946faa49f616f0a2b10fe14a8612cdcc69d97b33_arm64", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:978dfb76e92331565eb1590e7e3d3ad25bfcbdaad9c20f72cba6e43b6a0920cd_s390x", "8Base-RHOSE-4.9:openshift4/ose-cli@sha256:efa64b42b83eb0a9ee46bbcab301d1e088646671d0d4d5339c3a75872e8550d0_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:57a7ba8dd6a91ecb3b1b4288f887d35dc23cefc4c407af0526b146ab6162702f_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:594e537093806ee6e79224a923a0d28dcc25ec180d9a560044c13d5c760bc807_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:5ff6f7852ad8f01a3f70a7891d811d4cf8e3de64de9bc4a813f1d6a8c7fd90d2_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e1bbd53fcda2722e44fbec0ee923f839e8cf5ea6e38f3cc973589a0d23ef87c4_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:1df87098b0736f61212ab55146ec3e22419a5dde87d40d514f5d24614e5c9529_amd64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:37800a9c1017dacab96ed52727b3bfa90b965fd5712abfa5fdadabb21c7cfa66_arm64", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:e0c9378ba2d9fe82250af4c5b53b3e760934482298e55cc1bf41973835a869b4_s390x", "8Base-RHOSE-4.9:openshift4/ose-cluster-monitoring-operator@sha256:fc832e18a75b0eee2442859dfadf24145b316c3f7966cdbd295bc03f58fbcacc_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:31e84a9e54116daefd2c9828e449e5647d9bb12230a19b7b2267ffd74b78964d_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:3f6cd675aab05ae85d7635a88bf9c48df7df83b192f80b1091a6417027813db5_arm64", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:aec5c00e62393d2d679dae57cd925fde5904016a0350952d2de5f3e1025bd4f6_s390x", "8Base-RHOSE-4.9:openshift4/ose-console@sha256:b5db91f6f71958d2275967ccf5753bfe6f50396a463b02567a307235fbb76f07_amd64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:3e84917a7bab503493b592b7224c9d3876e570a9fd1777dbf9e5ae20de297494_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:624896e504b4a672507e9f04ed77c63732666704543349568dd71842e9c63111_s390x", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:8a163dfa65b43d2eae1a05d18b62c04f312d3c660f77103b799fa3f41555252d_arm64", "8Base-RHOSE-4.9:openshift4/ose-deployer@sha256:cf21d3e3078b96feba08d2ddc6efb9eaaef3a25510a2a94cd60d8a7cf7ae8742_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:12fd09b8b8c19fa13801cbd7cd0cb96b427c2a28d2a32dc4fd4813aef45b3515_amd64", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:4020e11d899387f19ec6a872f2edaa482c97bc38da44dfe7e581044cf86eb163_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:54f2b53fc0dcbae47b64cdbabb8d2e599a901e803abde5e35f9cfa072449218e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer-artifacts@sha256:ae1861a551d075c2b020663f4e50e91ceacae40030f497bab0e8874fa06a02b7_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1d418a5550c3a42102958325d2dc0cd85924379282118ec8ddae5768c149eb57_arm64", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:1e9ec7bb9041f78635f72ea89dca762a38d4bdad9cc8570fb2ef5eda23da6afb_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:35be67fafb191febf3ef5f5e8616994634cc3eac3437c19ac624c62c7b49dcb6_s390x", "8Base-RHOSE-4.9:openshift4/ose-installer@sha256:75bc8e0526fbfc0b0d26d438dad823578f7f7de19f2d9174761d5d516dcda870_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:242b04468a65f8089a534387d110f5271d5f15390d0c30bee10eb7e3662d921a_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:2e41303b5abe66877ef6eda7d8495cdbdd517ac10eebac1879d2288ee5e1a7e6_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:3323779fe21126062eabf1e5240739e62139131424129e73b19f7c32ed1cb71c_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-base@sha256:66185f53f7f0d74961837f5f5bee90ebd5a969513a3dbc9e4b64bcc538dbf977_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:02ede27ec4455daac0542dc78299cb655b60d0d604eec22af50ae0f75c48154e_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:21c005009ff61ca1c3e815e0ea8c676c53a2b1a0cbb4f9c83ee9eec7781d76a4_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:92ec94b8d98ac498251164556a1c82907ea5c0fba1921711288313daa2c913f5_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-maven@sha256:d7af7115a138cb027b98bf74a7d481881d165d97cc12c1ce858de5783aed7eac_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:0c464a1271728040b8b3e1906c00087e8d0706670539a9c20d189aa7e1d63b1b_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:7b7c083f4e3405971db7c63b4f0a5695a93276b551b8433ca9a1b492a7b8bd4e_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:bf1de74c675ef000f1b273b450419f3b36a9cda6fa77e06712ab5fc2438081b7_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:c91e236a0d9b7f0d6951d524081d35d939c5a4226b5dd9e94d8a9f46f888c781_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:12f98757b8287346947848187beeeb088b8258717fc0fdf6bf0001df256d380f_amd64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:a057a1e9876f279119c17afbedae76c880e310e75e05dc09409bb8b13ce914a9_s390x", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:cd66e0e1e4d3f1c33929fde11bf6cfed478ea756e884377ebab10a21c55ae345_arm64", "8Base-RHOSE-4.9:openshift4/ose-jenkins@sha256:f85902b08c5e23d55b509f87b6fd01729e034f670ac6076f2e4bc9230ca58606_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:10c600a9e5d935d693ee595d543c81a9f292d6ea2620895af36030c6c2945da4_arm64", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:81c6212317b80fa4c557c2252eabf3de5b749b8ccf23b684163006071aab0746_s390x", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:8ae56ad719ee0b1ac8fea5063c2cf6c7005810159c6b4de8c4bfdeb69ecdf594_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-machine-config-operator@sha256:d756358cb57fc61e6f826bbd9e7ea98a369ad463737ce7ba26bca6e50d31f03d_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:00f49651c52fa685f62409975791be1b3690e5b36fb95f437a24eac89efbdcf1_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:81e85b5b7dcc68a4561e810570493b1e859e27294a4a3192afd77d2764c990fe_amd64", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:c21cf2548fb1ac39c636b04d507c1e6e86e77ec050449f853a4b82663e6af8d0_s390x", "8Base-RHOSE-4.9:openshift4/ose-must-gather@sha256:da47acb4ac4c86d8ec19ec35aaa64ff84277e0d646f8e6d13c05b80c1c826f6b_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:5bfcec0a606f688876224433a48c039e1ece8e2d41647134db5b09c7abdac701_amd64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:61aec5d4bccb68ec425cabfbaa3add71ef9354391386bfc599f5b837e8ac3a19_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:73bc212a2b46ba476033019791bd7cacaf3fadcd605601e1640a983742cf64c4_arm64", "8Base-RHOSE-4.9:openshift4/ose-ovn-kubernetes@sha256:db48699a9131b5540b6e8de8d848bebfff30c2b0dc38205fc1693f5b80a0476c_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:12f90a7589521f3b5dbf5715c752edbeaffb22bfd78e16fbd7d184e6330cb58e_s390x", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:733d3576f8be767339e3dbf57a4b299f4e92ba9c743bcd023ebc3f1dd8afdae7_arm64", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ad0d18551e63a10efac7fff782411d16b1d37c93dacf7ad18ba784688301016b_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tests@sha256:ccb0ee33ba896e16943a9e1a0cb99db32d04f9ae1ce36c86359b179898de6438_amd64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:33b059ab267a08737bab66a42c42f64d034e9417c8f6caee095cefabfb54c067_ppc64le", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:53d678e29da02476da7b1c38fb8acfa598fcdbb2e4861ecdabe52c03720f6f38_arm64", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:56dee78fa02bb2941c15568995448158561a4e30a1d578479efeb76e349fc4ec_s390x", "8Base-RHOSE-4.9:openshift4/ose-tools-rhel8@sha256:f222e8e4a4e99fea5548b95381e026807dd64beb272376e454c10b9f5b17861b_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
rhsa-2022_0432
Vulnerability from csaf_redhat
Published
2022-02-03 16:10
Modified
2024-12-17 21:54
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.20.0
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)
* golang: Command-line arguments may overwrite global data (CVE-2021-38297)
* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.20.0\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.20.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.20.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n\n* golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet (CVE-2021-29923)\n\n* golang: Command-line arguments may overwrite global data (CVE-2021-38297)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196) (CVE-2021-39293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0432", "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "2024823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0432.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.20.0", "tracking": { "current_release_date": "2024-12-17T21:54:04+00:00", "generator": { "date": "2024-12-17T21:54:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:0432", "initial_release_date": "2022-02-03T16:10:33+00:00", "revision_history": [ { "date": "2022-02-03T16:10:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-03T16:10:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:54:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product_id": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@0.26.0-2.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:0.26.0-2.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-29923", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1992006" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability potentially affects any component written in Go that uses the net standard library and ParseIP / ParseCIDR functions. There are components which might not use these functions or might use them to parse IP addresses and not manage them in any way (only store information about the ip address) . This reduces the severity of this vulnerability to Low for the following offerings:\n* OpenShift distributed tracing (formerly OpenShift Jaeger)\n* OpenShift Migration Toolkit for Containers\n* OpenShift Container Platform", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29923" }, { "category": "external", "summary": "RHBZ#1992006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29923", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29923" }, { "category": "external", "summary": "https://sick.codes/sick-2021-016/", "url": "https://sick.codes/sick-2021-016/" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet" }, { "cve": "CVE-2021-38297", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2012887" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. This vulnerability can only be triggered when invoking functions from vulnerable WASM (WebAssembly) Modules. Go can be compiled to WASM. If the product or service doesn\u0027t use WASM functions, it is not affected, although it uses golang.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: Command-line arguments may overwrite global data", "title": "Vulnerability summary" }, { "category": "other", "text": "* Although this flaw has a higher CVSS score, in a strict sense, the flaw could possibly enable code exec, either Red Hat products don\u0027t use WASM, or don\u0027t expose WASM functions in a way that makes code exec possible. For this reason, the Red Hat impact for this flaw is Moderate.\n\n* Because the flawed code is not actually used in Service Telemetry Framework1.3, no update will be provided at this time for STF\u0027s sg-core-container.\n\n*For a WASM Module to be vulnerable, it needs to be built using GOARCH=wasm GOOS=js (build options for WebAssembly).\n\n*CVE-2021-38297 is a vulnerability that affects Go (golang). It has been fixed in versions 1.17.2 and 1.16.9.\n\n*CVE-2021-38297 does not affect the OpenShift Container Platform (OCP) because it does not build anything with GOARCH=wasm GOOS=js. Hence, OCP-based services are not affected either.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38297" }, { "category": "external", "summary": "RHBZ#2012887", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2012887" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38297", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38297" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "release_date": "2021-10-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: Command-line arguments may overwrite global data" }, { "cve": "CVE-2021-39293", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2006044" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in archive/zip of the Go standard library. Applications written in Go can panic or potentially exhaust system memory when parsing malformed ZIP files. An attacker capable of submitting a crafted ZIP file to a Go application using archive/zip to process that file could cause a denial of service via memory exhaustion or panic. This particular flaw is an incomplete fix for a previous flaw.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)", "title": "Vulnerability summary" }, { "category": "other", "text": "* In OpenShift Container Platform, multiple components are written in Go and use archive/zip from the standard library. However, all such components are short lived client side tools, not long lived server side executables. As the maximum impact of this vulnerability is a denial of service in client utilities, this vulnerability is rated Low for OpenShift Container Platform.\n\n* This flaw is out of support scope for Red Hat Enterprise Linux 7. For more information about Red Hat Enterprise Linux support scope, please see https://access.redhat.com/support/policy/updates/errata\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s smart-gateway-container and sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-39293" }, { "category": "external", "summary": "RHBZ#2006044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006044" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-39293", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-03T16:10:33+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0432" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:0.26.0-2.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/zip: malformed archive may cause panic or memory exhaustion (incomplete fix of CVE-2021-33196)" } ] }
ghsa-j532-8pqq-78jr
Vulnerability from github
Published
2022-01-25 00:02
Modified
2022-06-15 00:00
Severity ?
Details
In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
{ "affected": [], "aliases": [ "CVE-2021-39293" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-24T01:15:00Z", "severity": "HIGH" }, "details": "In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.", "id": "GHSA-j532-8pqq-78jr", "modified": "2022-06-15T00:00:30Z", "published": "2022-01-25T00:02:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39293" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220217-0009" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.